Sciweavers

2409 search results - page 321 / 482
» Reverse engineering the Internet
Sort
View
COMPSAC
2005
IEEE
15 years 10 months ago
Protecting Users Against Phishing Attacks with AntiPhish
Phishing is a form of online identity theft that aims to steal sensitive information such as online banking passwords and credit card information from users. Phishing scams have b...
Engin Kirda, Christopher Krügel
ICWE
2005
Springer
15 years 10 months ago
An Article Language Model for BBS Search
Bulletin Board Systems (BBS), similar to blogs, newsgroups, online forums, etc., are online broadcasting spaces where people can exchange ideas and make announcements. As BBS are b...
Jingfang Xu, Yangbo Zhu, Xing Li
DSOM
2004
Springer
15 years 10 months ago
Autonomous Management of Clustered Server Systems Using JINI
Abstract. A framework for the autonomous management of clustered server systems called LAMA1 (Large-scale system’s Autonomous Management Agent) is proposed in this paper. LAMA is...
Chul Lee, Seung Ho Lim, Sang Seok Lim, Kyu Ho Park
ICWL
2004
Springer
15 years 10 months ago
The Agile Teaching/Learning Methodology and Its e-Learning Platform
Abstract. The Agile Teaching/Learning Methodology (ATLM) is a teaching/learning methodology designed for higher-education based on the best practices and ideas from the field of so...
Andy Hon Wai Chun
APWEB
2003
Springer
15 years 10 months ago
A Framework for Decentralized Ranking in Web Information Retrieval
Search engines are among the most important applications or services on the web. Most existing successful search engines use global ranking algorithms to generate the ranking of do...
Karl Aberer, Jie Wu