Sciweavers

2143 search results - page 285 / 429
» corr 2010
Sort
View
99
Voted
CORR
2010
Springer
352views Education» more  CORR 2010»
15 years 1 months ago
Case Study On Social Engineering Techniques for Persuasion
T There are plenty of security software in market; each claiming the best, still we daily face problem of viruses and other malicious activities. If we know the basic working prin...
Mosin Hasan, Nilesh Prajapati, Safvan Vohara
80
Voted
CORR
2010
Springer
152views Education» more  CORR 2010»
15 years 1 months ago
A Faster Algorithm for Quasi-convex Integer Polynomial Optimization
We present a faster exponential-time algorithm for integer optimization over quasi-convex polynomials. We study the minimization of a quasiconvex polynomial subject to s quasi-con...
Robert Hildebrand, Matthias Köppe
142
Voted
CORR
2010
Springer
87views Education» more  CORR 2010»
15 years 1 months ago
Publishing and Discovery of Mobile Web Services in Peer to Peer Networks
: It is now feasible to host Web Services on a mobile device due to the advances in cellular devices and mobile communication technologies. However, the reliability, usability and ...
Satish Narayana Srirama
88
Voted
CORR
2010
Springer
135views Education» more  CORR 2010»
15 years 1 months ago
Optimal Design of a Molecular Recognizer: Molecular Recognition as a Bayesian Signal Detection Problem
Numerous biological functions--such as enzymatic catalysis, the immune response system, and the DNA-protein regulatory network--rely on the ability of molecules to specifically rec...
Yonatan Savir, Tsvi Tlusty
CORR
2010
Springer
178views Education» more  CORR 2010»
15 years 1 months ago
Automatic Recommendation for Online Users Using Web Usage Mining
A real world challenging task of the web master of an organization is to match the needs of user and keep their attention in their web site. So, only option is to capture the intu...
Dipa Dixit, Jayant Gadge