Sciweavers

27692 search results - page 5427 / 5539
» Where is ...
Sort
View
FIRSTMONDAY
2010
163views more  FIRSTMONDAY 2010»
13 years 6 months ago
Bubbles, gullibility, and other challenges for economics, psychology, sociology, and information sciences
Abstract. Gullibility is the principal cause of bubbles. Investors and the general public get snared by a "beautiful illusion" and throw caution to the wind. Attempts to ...
Andrew M. Odlyzko
FOCM
2010
122views more  FOCM 2010»
13 years 6 months ago
Scattering in Flatland: Efficient Representations via Wave Atoms
This paper presents a numerical compression strategy for the boundary integral equation of acoustic scattering in two dimensions. These equations have oscillatory kernels that we ...
Laurent Demanet, Lexing Ying
GLOBECOM
2010
IEEE
13 years 6 months ago
Skip Finite Automaton: A Content Scanning Engine to Secure Enterprise Networks
Abstract--Today's file sharing networks are creating potential security problems to enterprise networks, i.e., the leakage of confidential documents. In order to prevent such ...
Junchen Jiang, Yi Tang, Bin Liu, Yang Xu, Xiaofei ...
IJDET
2010
123views more  IJDET 2010»
13 years 6 months ago
An Adaptive Course Generation Framework
: Existing adaptive e-learning methods are supported by student (user) profiling for capturing student characteristics, and course structuring for organizing learning materials acc...
Frederick W. B. Li, Rynson W. H. Lau, Parthiban Dh...
IJSSE
2010
80views more  IJSSE 2010»
13 years 6 months ago
Improving Memory Management Security for C and C++
Memory managers are an important part of any modern language: they are used to dynamically allocate memory for use in the program. Many managers exist and depending on the operati...
Yves Younan, Wouter Joosen, Frank Piessens, Hans V...
« Prev « First page 5427 / 5539 Last » Next »