Sciweavers

524 search results - page 52 / 105
» Why phishing works
Sort
View
TKDE
2012
199views Formal Methods» more  TKDE 2012»
13 years 2 months ago
Subscriber Assignment for Wide-Area Content-Based Publish/Subscribe
— We study the problem of assigning subscribers to brokers in a wide-area content-based publish/subscribe system. A good assignment should consider both subscriber interests in t...
Albert Yu, Pankaj K. Agarwal, Jun Yang
ESWS
2007
Springer
15 years 6 months ago
Towards a Semantic Wiki for Science
Collaborative work environments for scientific knowledge have many applications in research as well as in education. Such systems already exist (e.g. Wikipedia and PlanetMath), b...
Christoph Lange 0002
USENIX
2001
15 years 1 months ago
Page Replacement in Linux 2.4 Memory Management
While the virtual memory management in Linux 2.2 has decent performance for many workloads, it suffers from a number of problems. The first part of this paper contains a descripti...
Rik van Riel
CHI
2005
ACM
16 years 7 days ago
Understanding email use: predicting action on a message
Email consumes significant time and attention in the workplace. We conducted an organizational survey to understand how and why people attend to incoming email messages. We examin...
Laura A. Dabbish, Robert E. Kraut, Susan R. Fussel...
CLUSTER
2009
IEEE
15 years 6 months ago
Oblivious routing schemes in extended generalized Fat Tree networks
—A family of oblivious routing schemes for Fat Trees and their slimmed versions is presented in this work. First, two popular oblivious routing algorithms, which we refer to as S...
Germán Rodríguez, Cyriel Minkenberg,...