Sciweavers

534 search results - page 86 / 107
» Linked data on the web (LDOW2008)
Sort
View
ECRIME
2007
14 years 2 months ago
Behavioral response to phishing risk
Tools that aim to combat phishing attacks must take into account how and why people fall for them in order to be effective. This study reports a pilot survey of 232 computer users...
Julie S. Downs, Mandy B. Holbrook, Lorrie Faith Cr...
ESWS
2008
Springer
14 years 12 days ago
Combining Fact and Document Retrieval with Spreading Activation for Semantic Desktop Search
Abstract. The Semantic Desktop is a means to support users in Personal Information Management (PIM). It provides an excellent test bed for Semantic Web technology: resources (e. g....
Kinga Schumacher, Michael Sintek, Leo Sauermann
CN
2007
80views more  CN 2007»
13 years 10 months ago
Receiver-centric congestion control with a misbehaving receiver: Vulnerabilities and end-point solutions
Receiver-driven TCP protocols delegate key congestion control functions to receivers. Their goal is to exploit information available only at receivers in order to improve latency ...
Aleksandar Kuzmanovic, Edward W. Knightly
ISCA
2008
IEEE
136views Hardware» more  ISCA 2008»
13 years 10 months ago
A Randomized Queueless Algorithm for Breadth-First Search
First Come First Served is a policy that is accepted for implementing fairness in a number of application domains such as scheduling in Operating Systems [28, 11], scheduling web ...
K. Subramani, Kamesh Madduri
CORR
2007
Springer
162views Education» more  CORR 2007»
13 years 10 months ago
Exploiting Social Annotation for Automatic Resource Discovery
Information integration applications, such as mediators or mashups, that require access to information resources currently rely on users manually discovering and integrating them ...
Anon Plangprasopchok, Kristina Lerman