Sciweavers

524 search results - page 73 / 105
» Why phishing works
Sort
View
CCECE
2009
IEEE
15 years 3 months ago
Prohibitive-link Detection and Routing Protocol
In this paper we investigate the limits of routing according to left- or righthand rule (LHR). Using LHR, a node upon receipt of a message will forward to the neighbour that sits ...
Marwan Fayed, Hussein T. Mouftah
AAAI
2007
15 years 2 months ago
Search Space Reduction and Russian Doll Search
In a constraint optimization problem (COP), many feasible valuations lead to the same objective value. This often means a huge search space and poor performance in the propagation...
Kenil C. K. Cheng, Roland H. C. Yap
WSC
2008
15 years 2 months ago
Optimization of Multi-Project Environment (OPMPE)
Construction business is project oriented and that is why every construction organization is dependent on projects. Typically they undertake multiple projects with limited multipl...
Lokman Hossain, Janaka Ruwanpura
COLT
2008
Springer
15 years 1 months ago
Model Selection and Stability in k-means Clustering
Clustering Stability methods are a family of widely used model selection techniques applied in data clustering. Their unifying theme is that an appropriate model should result in ...
Ohad Shamir, Naftali Tishby
ECAI
2008
Springer
15 years 1 months ago
Automating Accreditation of Medical Web Content
123456 The increasing amount of freely available healthrelated web content generates, on one hand, excellent conditions for self-education of patients as well as physicians, but on...
Vangelis Karkaletsis, Pythagoras Karampiperis, Kon...