Sciweavers
Explore
Publications
Books
Software
Tutorials
Presentations
Lectures Notes
Datasets
Labs
Conferences
Community
Upcoming
Conferences
Top Ranked Papers
Most Viewed Conferences
Conferences by Acronym
Conferences by Subject
Conferences by Year
Tools
PDF Tools
Image Tools
Text Tools
OCR Tools
Symbol and Emoji Tools
On-screen Keyboard
Latex Math Equation to Image
Smart IPA Phonetic Keyboard
Community
Sciweavers
About
Terms of Use
Privacy Policy
Cookies
524
search results - page 7 / 105
»
Why phishing works
Sort
relevance
views
votes
recent
update
View
thumb
title
116
click to vote
SLIP
2000
ACM
72
views
Computer Networks
»
more
SLIP 2000
»
Why interconnect prediction doesn't work
15 years 9 months ago
Download
vlsicad.ucsd.edu
Louis Scheffer, Eric Nequist
claim paper
Read More »
97
click to vote
KDD
1997
ACM
116
views
Data Mining
»
more
KDD 1997
»
Why Does Bagging Work? A Bayesian Account and its Implications
15 years 8 months ago
Download
www.aaai.org
Pedro Domingos
claim paper
Read More »
166
click to vote
ECA
1994
192
views
Theoretical Computer Science
»
more
ECA 1994
»
Abstraction, ethics and software: why don't the rules work?
15 years 8 months ago
Download
www.cse.unsw.edu.au
Shelly Warwick
claim paper
Read More »
97
click to vote
NAACL
2007
66
views
Computational Linguistics
»
more
NAACL 2007
»
Whose Idea Was This, and Why Does it Matter? Attributing Scientific Work to Citations
15 years 6 months ago
Download
www.cl.cam.ac.uk
Advaith Siddharthan, Simone Teufel
claim paper
Read More »
149
click to vote
SODA
2008
ACM
110
views
Algorithms
»
more
SODA 2008
»
Why simple hash functions work: exploiting the entropy in a data stream
15 years 6 months ago
Download
www.eecs.harvard.edu
Hashing is fundamental to many algorithms and data structures widely used in practice. For theoretical analysis of hashing, there have been two main approaches. First, one can ass...
Michael Mitzenmacher, Salil P. Vadhan
claim paper
Read More »
« Prev
« First
page 7 / 105
Last »
Next »