Sciweavers

192 search results - page 23 / 39
» Who gets spammed
Sort
View
ACMSE
2007
ACM
15 years 7 months ago
Integrating BlackBerry wireless devices into computer programming and literacy courses
In this paper we describe our experience in integrating the RIM's BlackBerry handheld wireless device into programming and literacy courses at the University of Guelph and th...
Qusay H. Mahmoud, Allan Dyer
COCOON
2007
Springer
15 years 7 months ago
Scheduling Selfish Tasks: About the Performance of Truthful Algorithms
This paper deals with problems which fall into the domain of selfish scheduling: a protocol is in charge of building a schedule for a set of tasks without directly knowing their l...
George Christodoulou, Laurent Gourvès, Fann...
118
Voted
ECRIME
2007
15 years 7 months ago
Examining the impact of website take-down on phishing
Banks and other organisations deal with fraudulent phishing websites by pressing hosting service providers to remove the sites from the Internet. Until they are removed, the fraud...
Tyler Moore, Richard Clayton
115
Voted
AMAST
2006
Springer
15 years 7 months ago
Some Programming Languages for Logspace and Ptime
We propose two characterizations of complexity classes by means of programming languages. The first concerns Logspace while the second leads to Ptime. This latter characterization ...
Guillaume Bonfante
CCS
2006
ACM
15 years 7 months ago
On the modeling and analysis of obligations
Traditional security policies largely focus on access control requirements, which specify who can access what under what circumstances. Besides access control requirements, the av...
Keith Irwin, Ting Yu, William H. Winsborough