Sciweavers

524 search results - page 63 / 105
» Why phishing works
Sort
View
AICT
2009
IEEE
172views Communications» more  AICT 2009»
15 years 6 months ago
A Practical Characterization of 802.11 Access Points in Paris
Unlike other wireless technologies, the deployment of 802.11 networks is not limited to operators: access points can easily be installed by end-users for domestic use. This singul...
Guillaume Valadon, Florian Le Goff, Christophe Ber...
ICML
2009
IEEE
15 years 6 months ago
Using fast weights to improve persistent contrastive divergence
The most commonly used learning algorithm for restricted Boltzmann machines is contrastive divergence which starts a Markov chain at a data point and runs the chain for only a few...
Tijmen Tieleman, Geoffrey E. Hinton
COMPLEX
2009
Springer
15 years 6 months ago
Exploring and Understanding Scientific Metrics in Citation Networks
This paper explores scientific metrics in citation networks in scientific communities, how they differ in ranking papers and authors, and why. In particular we focus on network eff...
Mikalai Krapivin, Maurizio Marchese, Fabio Casati
GECCO
2009
Springer
156views Optimization» more  GECCO 2009»
15 years 6 months ago
Insight knowledge in search based software testing
Software testing can be re-formulated as a search problem, hence search algorithms (e.g., Genetic Algorithms) can be used to tackle it. Most of the research so far has been of emp...
Andrea Arcuri
ACSAC
2008
IEEE
15 years 6 months ago
A Survey to Guide Group Key Protocol Development
A large number of papers have proposed cryptographic protocols for establishing secure group communication. These protocols allow group members to exchange or establish keys to en...
Ahren Studer, Christina Johns, Jaanus Kase, Kyle O...