Sciweavers

524 search results - page 16 / 105
» Why phishing works
Sort
View
CORR
2010
Springer
144views Education» more  CORR 2010»
13 years 8 months ago
A secure email login system using virtual password
In today's world password compromise by some adversaries is common for different purpose. In ICC 2008 Lei et al. proposed a new user authentication system based on the virtual...
Nishant Doshi
ICDT
2001
ACM
124views Database» more  ICDT 2001»
14 years 27 days ago
Why and Where: A Characterization of Data Provenance
Withthe proliferation of database views and curated databases, the issue of data provenance where a piece of data came from and the process by which it arrived in the database is b...
Peter Buneman, Sanjeev Khanna, Wang Chiew Tan
ICIA
2007
13 years 10 months ago
Why and How to Model Multi-Modal Interaction for a Mobile Robot Companion
Verbal and non-verbal interaction capabilities for robots are often studied isolated from each other in current research trend because they largely contribute to different aspects...
Shuyin Li, Britta Wrede
AC
2002
Springer
13 years 8 months ago
Software Fault Prevention by Language Choice: Why C is Not My Favorite Language
How much does the choice of a programming language influence the prevalence of bugs in the resulting code? It seems obvious that at the level at which individuals write new progra...
Richard J. Fateman
GECCO
2009
Springer
103views Optimization» more  GECCO 2009»
14 years 3 months ago
Why evolution is not a good paradigm for program induction: a critique of genetic programming
We revisit the roots of Genetic Programming (i.e. Natural Evolution), and conclude that the mechanisms of the process of evolution (i.e. selection, inheritance and variation) are ...
John R. Woodward, Ruibin Bai