Sciweavers

208 search results - page 32 / 42
» What Helps Where - And Why
Sort
View
IEEECIT
2010
IEEE
13 years 8 months ago
Are the Con Artists Back? A Preliminary Analysis of Modern Phone Frauds
—Phishing is the practice of eliciting a person’s confidential information such as the name, date of birth or credit card details. Typically, the phishers combine some technol...
Federico Maggi

Book
410views
15 years 7 months ago
Action Arcade Adventure Set
"Have you ever played a side-scrolling action arcade game on your PC and wondered what it takes to program one? How do the programmers scroll their backgrounds so fast and mak...
Diana Gruber
CICLING
2003
Springer
14 years 3 months ago
An Evaluation of a Lexicographer's Workbench Incorporating Word Sense Disambiguation
NLPsystem developers and corpus lexicographers would both bene t from a tool for nding and organizing the distinctive patterns of use of words in texts. Such a tool would be an ass...
Adam Kilgarriff, Rob Koeling
KI
2007
Springer
14 years 4 months ago
Pinpointing in the Description Logic EL+
Axiom pinpointing has been introduced in description logics (DLs) to help the user understand the reasons why consequences hold by computing minimal subsets of the knowledge base t...
Franz Baader, Rafael Peñaloza, Boontawee Su...
ICSE
1999
IEEE-ACM
14 years 2 months ago
Experience with Performing Architecture Tradeoff Analysis
Software architectures, like complex designs in any field, embody tradeoffs made by the designers. However, these tradeoffs are not always made explicitly by the designers and the...
Rick Kazman, Mario Barbacci, Mark Klein, S. Jeromy...