Sciweavers

524 search results - page 38 / 105
» Why phishing works
Sort
View
ACL
1998
13 years 10 months ago
Information Classification and Navigation Based on 5W1H of the Target Information
This paper proposes a method by which 5WlH (who, when, where, what, why, how, and predicate) information is used to classify and navigate Japaneselanguage texts. 5WlH information,...
Takahiro Ikeda, Akitoshi Okumura, Kazunori Muraki
COMGEO
1999
ACM
13 years 8 months ago
Optimal triangulation and quadric-based surface simplification
Many algorithms for reducing the number of triangles in a surface model have been proposed, but to date there has been little theoretical analysis of the approximations they produ...
Paul S. Heckbert, Michael Garland
ICWSM
2009
13 years 6 months ago
A Social Identity Approach to Identify Familiar Strangers in a Social Network
We present a novel problem of searching for `familiar strangers' in a social network. Familiar strangers are individuals who are not directly connected but exhibit some simil...
Nitin Agarwal, Huan Liu, Sudheendra Murthy, Arunab...
FSE
2011
Springer
218views Cryptology» more  FSE 2011»
13 years 7 min ago
Practical Near-Collisions and Collisions on Round-Reduced ECHO-256 Compression Function
In this paper, we present new results on the second-round SHA-3 candidate ECHO. We describe a method to construct a collision in the compression function of ECHO-256 reduced to fou...
Jérémy Jean, Pierre-Alain Fouque
SDM
2012
SIAM
208views Data Mining» more  SDM 2012»
11 years 11 months ago
Mining Massive Archives of Mice Sounds with Symbolized Representations
Many animals produce long sequences of vocalizations best described as “songs.” In some animals, such as crickets and frogs, these songs are relatively simple and repetitive c...
Jesin Zakaria, Sarah Rotschafer, Abdullah Mueen, K...