Sciweavers

524 search results - page 13 / 105
» Why phishing works
Sort
View
CVPR
2010
IEEE
14 years 4 months ago
What Helps Where - And Why? Semantic Relatedness for Knowledge Transfer
Remarkable performance has been reported to recognize single object classes. Scalability to large numbers of classes however remains an important challenge for today's recogn...
Marcus Rohrbach, Michael Stark, Gyö Szarvas, Bern...
CSEE
2007
Springer
14 years 2 months ago
Lab Partners: If They're Good Enough for the Natural Sciences, Why Aren't They Good Enough for Us?
Despite many professed benefits of collaboration, some computer science educators feel students need to master work individually, particularly in the courses early in the curricul...
Laurie Williams, Lucas Layman
POPL
2006
ACM
14 years 8 months ago
Why dependent types matter
We exhibit the rationale behind the design of Epigram, a dependently typed programming language and interactive program development system, using refinements of a well known progr...
James McKinna
OOPSLA
2004
Springer
14 years 1 months ago
RUBiS revisited: why J2EE benchmarking is hard
We have replicated the experiments of Cecchet et al. detailed in ”Performance and Scalability of EJB Applications” at OOPSLA ’02. We report on our experiences configuring, ...
William Pugh, Jaime Spacco
BIS
2006
150views Business» more  BIS 2006»
13 years 9 months ago
Why Do We Actually Need the Pi-Calculus for Business Process Management?
This paper discusses the applicability of a process algebra, the -calculus, as a formal foundation for Business Process Management (BPM). We therefore investigate the -calculus fro...
Frank Puhlmann