Sciweavers

524 search results - page 30 / 105
» Why phishing works
Sort
View
HICSS
2003
IEEE
260views Biometrics» more  HICSS 2003»
14 years 1 months ago
Automating Land Management: An Interpretive Analysis of Information Technology Management within the Bureau of Land Management
Given societies’ massive investment in information technology and the potentially catastrophic consequences of IT failures, it is becoming increasingly critical to understand ho...
John C. Beachboard
AAAI
1998
13 years 9 months ago
Boosting in the Limit: Maximizing the Margin of Learned Ensembles
The "minimum margin" of an ensemble classifier on a given training set is, roughly speaking, the smallest vote it gives to any correct training label. Recent work has sh...
Adam J. Grove, Dale Schuurmans

Publication
383views
15 years 9 months ago
The Cathedral and the Bazaar
Ever wondered why open source finally yields products that work? Eric Raymod discusses that in this paper using the bazaar as a metaphor for open source hacker developed software t...
Eric Raymond
ADAEUROPE
2008
Springer
14 years 2 months ago
Can We Increase the Usability of Real Time Scheduling Theory? The Cheddar Project
The Cheddar project deals with real time scheduling theory. Many industrial projects do not perform performance analysis with real time scheduling theory even if the demand for the...
Frank Singhoff, Alain Plantec, Pierre Dissaux
ICDCSW
2007
IEEE
14 years 2 months ago
Survey of Six Myths and Oversights about Distributed Hash Tables' Security
Distributed Hash Tables (DHT) was not designed to be secure against malicious users. But some secure systems like trust and reputation management algorithms trust DHT with their d...
Sylvain Dahan, Mitsuhisa Sato