Sciweavers

546 search results - page 37 / 110
» Behavioral experiments in networked trade
Sort
View
SEC
2007
13 years 10 months ago
Identity Theft - Empirical evidence from a Phishing Exercise
Identity theft is an emerging threat in our networked world and more individuals and companies fall victim to this type of fraud. User training is an important part of ICT security...
Tjaart Steyn, Hennie A. Kruger, Lynette Drevin
CODES
2009
IEEE
14 years 3 months ago
Using binary translation in event driven simulation for fast and flexible MPSoC simulation
In this paper, we investigate the use of instruction set simulators (ISS) based on binary translation to accelerate full timed multiprocessor system simulation at transaction leve...
Marius Gligor, Nicolas Fournel, Frédé...
DCOSS
2005
Springer
14 years 2 months ago
Macro-programming Wireless Sensor Networks Using Kairos
The literature on programming sensor networks has focused so far on g higher-level abstractions for expressing local node behavior. Kairos is a natural next step in sensor network ...
Ramakrishna Gummadi, Omprakash Gnawali, Ramesh Gov...
BCSHCI
2009
13 years 9 months ago
Dramaturgical capitalization of positive emotions: the answer for Facebook success?
Although user behavior in the popular Facebook social network site has been intensely investigated since the site came live in 2004, we know little about users' emotions and ...
Corina Sas, Alan J. Dix, Jennefer Hart, Ronghui Su
LISA
2007
13 years 11 months ago
Application Buffer-Cache Management for Performance: Running the World's Largest MRTG
An operating system’s readahead and buffer-cache behaviors can significantly impact application performance; most often these better performance, but occasionally they worsen it...
David Plonka, Archit Gupta, Dale Carder