Sciweavers

3747 search results - page 221 / 750
» Active Operations on Collections
Sort
View
ECRIME
2007
14 years 1 months ago
Fishing for phishes: applying capture-recapture methods to estimate phishing populations
We estimate of the extent of phishing activity on the Internet via capture-recapture analysis of two major phishing site reports. Capture-recapture analysis is a population estima...
Rhiannon Weaver, M. Patrick Collins
CASCON
2008
100views Education» more  CASCON 2008»
13 years 10 months ago
Is it a bug or an enhancement?: a text-based approach to classify change requests
Bug tracking systems are valuable assets for managing maintenance activities. They are widely used in open-source projects as well as in the software industry. They collect many d...
Giuliano Antoniol, Kamel Ayari, Massimiliano Di Pe...
WSC
2001
13 years 10 months ago
Managing event traces for a web front-end to a parallel simulation
To enhance the widespread use of a parallel supply chain simulator, a web front-end that enables access at any time and from any location has been developed. The front-end provide...
Boon-Ping Gan, Li Liu, Zhengrong Ji, Stephen John ...
JNCA
2006
114views more  JNCA 2006»
13 years 9 months ago
An evolutionary approach to prototyping pedagogical agents: from simulation to integrated system
We have developed and integrated software agents with two educational groupware systems (TeamWave Workplace and FLE), using evolutionary prototyping and empiricalbased design as d...
Anders I. Mørch, Jan A. Dolonen, Jan Eirik ...
TROB
2010
103views more  TROB 2010»
13 years 3 months ago
A Geometrically Exact Model for Externally Loaded Concentric-Tube Continuum Robots
Continuum robots, which are composed of multiple concentric, precurved elastic tubes, can provide dexterity at diameters equivalent to standard surgical needles. Recent mechanicsba...
D. Caleb Rucker, Bryan A. Jones, Robert J. Webster...