Sciweavers

524 search results - page 36 / 105
» Why phishing works
Sort
View
CN
2007
111views more  CN 2007»
13 years 8 months ago
Key management for content access control in a hierarchy
The need for content access control in hierarchies (CACH) appears naturally in all contexts where a set of users have different access rights to a set of resources. The hierarchy...
H. Ragab Hassen, Abdelmadjid Bouabdallah, Hatem Be...
COMPUTER
2004
120views more  COMPUTER 2004»
13 years 8 months ago
Computer Security in the Real World
After thirty years of work on computer security, why are almost all the systems in service today extremely vulnerable to attack? The main reason is that security is expensive to s...
Butler W. Lampson
ALIFE
2010
13 years 7 months ago
The Utility of Evolving Simulated Robot Morphology Increases with Task Complexity for Object Manipulation
Embodied artificial intelligence argues that the body and brain play equally important roles in the generation of adaptive behavior. An increasingly common approach therefore is to...
Josh Bongard
EUSFLAT
2009
162views Fuzzy Logic» more  EUSFLAT 2009»
13 years 6 months ago
Early Start Can Inhibit Learning: Towards A New Explanation
The age at which we teach different topics change. If it turns out that students do not learn, say, reading by the time they should, a natural idea is to start teaching them earlie...
Olga Kosheleva
IJMMS
2008
68views more  IJMMS 2008»
13 years 8 months ago
Mobile technologies in mobile spaces: Findings from the context of train travel
Whilst mobile work is increasingly prevalent, there is little detailed study of this phenomenon in the specific context of a train. Thus, the current study focuses on how mobile w...
Carolyn M. Axtell, Donald Hislop, Steve Whittaker