Sciweavers

524 search results - page 58 / 105
» Why phishing works
Sort
View
FMSD
2006
140views more  FMSD 2006»
14 years 12 months ago
Dealing with practical limitations of distributed timed model checking for timed automata
Two base algorithms are known for reachability verification over timed automata. They are called forward and backwards, and traverse the automata edges using either successors or p...
Víctor A. Braberman, Alfredo Olivero, Ferna...
PUC
2010
80views more  PUC 2010»
14 years 10 months ago
Mobile map interactions during a rendezvous: exploring the implications of automation
Abstract Location awareness can help facilitate a rendezvous of two or more persons. To further enhance the rendezvous experience, we conducted two complementary field studies to ...
David Dearman, Kori M. Inkpen, Khai N. Truong
SIGSOFT
2010
ACM
14 years 9 months ago
The future of research in free/open source software development
Free/Open Source Software (FOSS) development is not the same an Software Engineering (SE). Why this is so is unclear and open to various interpretations. Both address the challeng...
Walt Scacchi
CIKM
2011
Springer
13 years 11 months ago
Worker types and personality traits in crowdsourcing relevance labels
Crowdsourcing platforms offer unprecedented opportunities for creating evaluation benchmarks, but suffer from varied output quality from crowd workers who possess different levels...
Gabriella Kazai, Jaap Kamps, Natasa Milic-Frayling
SIGMOD
2002
ACM
181views Database» more  SIGMOD 2002»
15 years 12 months ago
Archiving scientific data
This report is part of the seminar Digital Information Curation held by Prof. Dr. Marc H. Scholl and Dr. Andr?e Seifert during the winter term 2005/06. Its intention is to summari...
Peter Buneman, Sanjeev Khanna, Keishi Tajima, Wang...