Sciweavers

524 search results - page 77 / 105
» Why phishing works
Sort
View
AICOM
2002
103views more  AICOM 2002»
14 years 11 months ago
The emergent computational potential of evolving artificial living systems
The computational potential of artificial living systems can be studied without knowing the algorithms that govern their behavior. Modeling single organisms by means of socalled c...
Jirí Wiedermann, Jan van Leeuwen
LOGCOM
2007
97views more  LOGCOM 2007»
14 years 11 months ago
Termination for Hybrid Tableaus
Abstract. This article extends and improves work on tableau-based decision methods for hybrid logic by Bolander and Bra¨uner [5]. Their paper gives tableau-based decision procedur...
Thomas Bolander, Patrick Blackburn
CCR
2004
100views more  CCR 2004»
14 years 11 months ago
A real options framework to value network, protocol, and service architecture
This paper proposes a real options framework for evaluating architectural choices and the economic value of these alternative choices of networks, protocols, and services. Using p...
Mark Gaynor, Scott Bradner
SIGKDD
2010
161views more  SIGKDD 2010»
14 years 10 months ago
Survey on social tagging techniques
Social tagging on online portals has become a trend now. It has emerged as one of the best ways of associating metadata with web objects. With the increase in the kinds of web obj...
Manish Gupta, Rui Li, Zhijun Yin, Jiawei Han
VL
2010
IEEE
221views Visual Languages» more  VL 2010»
14 years 10 months ago
Sketching and Drawing in the Design of Open Source Software
In co-located software development, diagramming practices, such as sketching ideas out with a pen and paper, support the creative process and allow designers to shape, analyze, an...
Eunyoung Chung, Carlos Jensen, Koji Yatani, Victor...