Sciweavers

1184 search results - page 70 / 237
» Nearness relations and topology
Sort
View
WISE
2005
Springer
14 years 4 months ago
A Potential IRI Based Phishing Strategy
We anticipate a potential phishing strategy by obfuscation of Web links using Internationalized Resource Identifier (IRI). In the IRI scheme, the glyphs of many characters look ver...
Anthony Y. Fu, Xiaotie Deng, Wenyin Liu
ICRA
2002
IEEE
177views Robotics» more  ICRA 2002»
14 years 4 months ago
Fatigue Life and Frequency Response of Braided Pneumatic Actuators
Although braided pneumatic actuators are capable of producing phenomenal forces compared to their weight, they have yet to see mainstream use due to their relatively short fatigue...
Daniel A. Kingsley, Roger D. Quinn
DEON
2010
Springer
14 years 3 months ago
Where Did Mally Go Wrong?
In 1926, Mally proposed the first formal deontic system. As Mally and others soon realized, this system had some rather strange consequences. We show that the strangeness of Mally...
Gert-Jan C. Lokhorst
WSC
2007
14 years 1 months ago
A teragrid-enabled distributed discrete event agent-based epidemiological simulation
We discuss design issues related to the transformation of a mature Agent-Based Model (ABM) for computational epidemiology into a “grid-aware” version. EpiSims is a distributed...
Douglas J. Roberts, Diglio A. Simoni
NAACL
2001
14 years 14 days ago
Identifying Cognates by Phonetic and Semantic Similarity
I present a method of identifying cognates in the vocabularies of related languages. I show that a measure of phonetic similarity based on multivalued features performs better tha...
Grzegorz Kondrak