Sciweavers

524 search results - page 81 / 105
» Why phishing works
Sort
View
VL
1997
IEEE
198views Visual Languages» more  VL 1997»
15 years 4 months ago
Behavior Processors: Layers between End-Users and Java Virtual Machines
Visual programming approaches are limited in their usefulness if they do not include a profile of their users that defines exactly who is attempting to solve what kind of problems...
Alexander Repenning, Andri Ioannidou
VLDB
1997
ACM
126views Database» more  VLDB 1997»
15 years 4 months ago
Dynamic Memory Adjustment for External Mergesort
Sorting is a memory intensive operation whose performance is greatly affected by the amount of memory available as work space. When the input size is unknown or available memory s...
Weiye Zhang, Per-Åke Larson
PEPM
1994
ACM
15 years 3 months ago
Partial Evaluation of Numerical Programs in Fortran
our results using the Fast Fourier Transformation, the N-body attraction problem, and the cubic splines interpolation as examples.We investigate the application of partial evaluati...
Romana Baier, Robert Glück, Robert Zöchl...
DLT
2007
15 years 1 months ago
Duplication Roots
Recently the duplication closure of words and languages has received much interest. We investigate a reversal of it: the duplication root reduces a word to a square-free one. After...
Peter Leupold
AAAI
2006
15 years 1 months ago
On Multi-Class Cost-Sensitive Learning
Rescaling is possibly the most popular approach to cost-sensitive learning. This approach works by rescaling the classes according to their costs, and it can be realized in differ...
Zhi-Hua Zhou, Xu-Ying Liu