Sciweavers

524 search results - page 32 / 105
» Why phishing works
Sort
View
NLDB
2001
Springer
14 years 28 days ago
Experiments with the Use of Syntactic Analysis in Information Retrieval
: Up to now, the results of applying sophisticated NL techniques to IR have been mostly disappointing. Our research aims at investigating in detail the role of syntactic analysis i...
Markus Mittendorfer, Werner Winiwarter
FSE
1999
Springer
87views Cryptology» more  FSE 1999»
14 years 23 days ago
Attack on Six Rounds of Crypton
Abstract. In this paper we present an attack on a reduced round version of Crypton. The attack is based on the dedicated Square attack. We explain why the attack also works on Cryp...
Carl D'Halluin, Gert Bijnens, Vincent Rijmen, Bart...
PEPM
1998
ACM
14 years 21 days ago
Eta-Redexes in Partial Evaluation
Abstract. Source-program modifications can make a partial evaluator yield dramatically better results. For example, eta-redexes can preserve static data flow by acting as an interf...
Jens Palsberg
AIML
2008
13 years 10 months ago
Three 13th-century views of quantified modal logic
There are two reasons why medieval logic is of interest to modern logician: One is to see how similar it is to modern logic and the other is to see how different it is. We study th...
Sara L. Uckelman
LREC
2008
154views Education» more  LREC 2008»
13 years 10 months ago
Building an Annotated Corpus for Text Summarization and Question Answering
We describe ongoing work in semi-automatic annotating corpus, with the goal to answer "why" question in question answering system and give a construction of the coherent...
Patcharee Varasai, Chaveevan Pechsiri, Thana Sukva...