Sciweavers

524 search results - page 71 / 105
» Why phishing works
Sort
View
HT
1998
ACM
15 years 4 months ago
An Agenda for Open Hypermedia Research
The historical development of hypermedia systems can be rized as a series of successive abstractions of functionality away from the "core" hypermedia server, often resul...
Peter J. Nürnberg, John J. Leggett, Uffe Kock...
IFIP
1992
Springer
15 years 3 months ago
Intelligent Access to Data and Knowledge Bases via User's Topics of Interest
Retrieving relevant information in Data and Knowledge Bases containing a large number of di erent types of information is a non trivial problem. That is the reason why, in areas l...
Sylvie Cazalens, Robert Demolombe
CHI
2007
ACM
15 years 3 months ago
A familiar face(book): profile elements as signals in an online social network
Using data from a popular online social network site, this paper explores the relationship between profile structure (namely, which fields are completed) and number of friends, gi...
Cliff Lampe, Nicole Ellison, Charles Steinfield
CP
2007
Springer
15 years 3 months ago
On Inconsistent Clause-Subsets for Max-SAT Solving
Recent research has focused on using the power of look-ahead to speed up the resolution of the Max-SAT problem. Indeed, look-ahead techniques such as Unit Propagation (UP) allow to...
Sylvain Darras, Gilles Dequen, Laure Devendeville,...
GROUP
2007
ACM
15 years 3 months ago
The "active" gatekeeper in collaborative information seeking activities
Multidisciplinary team members often must work together to find needed information. To identify when team members collaborate, why they collaborate, and how they collaborate durin...
Patricia Ruma Spence, Madhu C. Reddy