Sciweavers

524 search results - page 37 / 105
» Why phishing works
Sort
View
ICMCS
2007
IEEE
164views Multimedia» more  ICMCS 2007»
14 years 2 months ago
Constructing Secure Content-Dependent Watermarking Scheme using Homomorphic Encryption
Content-dependent watermarking (CDWM) has been proposed as a solution to overcome the potential estimation attack aiming to recover and remove the watermark from the host signal. ...
Zhi Li, Xinglei Zhu, Yong Lian, Qibin Sun
SWAT
2004
Springer
142views Algorithms» more  SWAT 2004»
14 years 1 months ago
Getting the Best Response for Your Erg
We consider the speed scaling problem of minimizing the average response time of a collection of dynamically released jobs subject to a constraint A on energy used. We propose an ...
Kirk Pruhs, Patchrawat Uthaisombut, Gerhard J. Woe...
GECCO
2003
Springer
14 years 1 months ago
Exploring a Two-Population Genetic Algorithm
In a two-market genetic algorithm applied to a constrained optimization problem, two ‘markets’ are maintained. One market establishes fitness in terms of the objective functio...
Steven Orla Kimbrough, Ming Lu, David Harlan Wood,...
CSCW
2000
ACM
14 years 26 days ago
How does radical collocation help a team succeed?
Companies are experimenting with putting teams into warrooms, hoping for some productivity enhancement. We conducted a field study of six such teams, tracking their activity, atti...
Stephanie Teasley, Lisa Covi, Mayuram S. Krishnan,...
MLMTA
2003
13 years 10 months ago
Just-in-Time Grammar
In this paper, we attempt to explain why rule-based syntactic analysis systems have not so far worked as well as they could. This will motivate our approach, which is based on a n...
Stephen Beale, Sergei Nirenburg, Marjorie McShane