Sciweavers

2075 search results - page 113 / 415
» aime 2007
Sort
View
ECRIME
2007
15 years 4 months ago
Behavioral response to phishing risk
Tools that aim to combat phishing attacks must take into account how and why people fall for them in order to be effective. This study reports a pilot survey of 232 computer users...
Julie S. Downs, Mandy B. Holbrook, Lorrie Faith Cr...
106
Voted
ELPUB
2007
ACM
15 years 4 months ago
Representing and Coding the Knowledge Embedded in Texts of Health Science Web Published Articles
Despite the fact that electronic publishing is a common activity to scholars, electronic journals are still based in the print model and do not take full advantage of the faciliti...
Carlos Henrique Marcondes, Marília Alvareng...
87
Voted
GECCO
2007
Springer
136views Optimization» more  GECCO 2007»
15 years 4 months ago
Configuring an evolutionary tool for the inventory and transportation problem
EVITA, standing for Evolutionary Inventory and Transportation Algorithm, aims to be a commercial tool to address the problem of minimising both the transport and inventory costs o...
Anna Esparcia-Alcázar, Lidia Lluch-Revert, ...
99
Voted
ICWS
2007
IEEE
15 years 2 months ago
A Semantic Web Services-based Infrastructure for Context-Adaptive Process Support
Current technologies aimed at supporting processes – whether it is a business or learning process – primarily follow a metadata- and data-centric paradigm. Whereas process met...
Stefan Dietze, Alessio Gugliotta, John Domingue
ICWE
2009
Springer
15 years 4 months ago
Semantic web access prediction using WordNet
The user observed latency of retrieving Web documents is one of limiting factors while using the Internet as an information data source. Prefetching became important technique ...
Lenka Hapalova