Sciweavers

582 search results - page 36 / 117
» Case Study On Social Engineering Techniques for Persuasion
Sort
View
PAKDD
2010
ACM
146views Data Mining» more  PAKDD 2010»
14 years 1 months ago
Mining Antagonistic Communities from Social Networks
During social interactions in a community, there are often sub-communities that behave in opposite manner. These antagonistic sub-communities could represent groups of people with ...
Kuan Zhang, David Lo, Ee-Peng Lim
EUROPAR
2000
Springer
14 years 2 days ago
On the Performance of Fetch Engines Running DSS Workloads
Abstract This paper examines the behavior of current and next generation microprocessors' fetch engines while running Decision Support Systems (DSS) workloads. We analyze the ...
Carlos Navarro, Alex Ramírez, Josep-Lluis L...
SAC
2005
ACM
14 years 2 months ago
Where web engineering tool support ends: building usable websites
In this paper, two of the currently available Web Engineering solutions (UWE and OO-H) are analysed with regard to the question whether websites created with them and their tools ...
Richard Atterer
INFSOF
2006
102views more  INFSOF 2006»
13 years 8 months ago
Comparison of software architecture reverse engineering methods
Problems related to interactions between components is a sign of problems with the software architecture of the system and are often costly to fix. Thus it is very desirable to id...
Catherine Stringfellow, C. D. Amory, Dileep Potnur...
CHES
2009
Springer
248views Cryptology» more  CHES 2009»
14 years 9 months ago
The State-of-the-Art in IC Reverse Engineering
? This paper gives an overview of the place of reverse engineering (RE) in the semiconductor industry, and the techniques used to obtain information from semiconductor products. Th...
Randy Torrance, Dick James