Sciweavers

524 search results - page 82 / 105
» Why phishing works
Sort
View
SOFTVIS
2010
ACM
14 years 12 months ago
Heapviz: interactive heap visualization for program understanding and debugging
Understanding the data structures in a program is crucial to understanding how the program works, or why it doesn't work. Inspecting the code that implements the data structu...
Edward Aftandilian, Sean Kelley, Connor Gramazio, ...
SYNTHESE
2011
239views more  SYNTHESE 2011»
14 years 6 months ago
Carnap on theoretical terms: structuralism without metaphysics
: Both realists and instrumentalists have found it difficult to understand (much less accept) Carnap’s developed view on theoretical terms, which attempts to stake out a neutral ...
Michael Friedman
WWW
2008
ACM
16 years 14 days ago
Optimal marketing strategies over social networks
We discuss the use of social networks in implementing viral marketing strategies. While influence maximization has been studied in this context (see Chapter 24 of [10]), we study ...
Jason D. Hartline, Vahab S. Mirrokni, Mukund Sunda...
IEEEPACT
2008
IEEE
15 years 6 months ago
Characterizing and modeling the behavior of context switch misses
One of the essential features in modern computer systems is context switching, which allows multiple threads of execution to time-share a limited number of processors. While very ...
Fang Liu, Fei Guo, Yan Solihin, Seongbeom Kim, Abd...
MUE
2007
IEEE
190views Multimedia» more  MUE 2007»
15 years 6 months ago
On Clustering Multimedia Time Series Data Using K-Means and Dynamic Time Warping
After the generation of multimedia data turned digital, an explosion of interest in their data storage, retrieval, and processing has drastically increased. This includes videos, ...
Vit Niennattrakul, Chotirat Ann Ratanamahatana