Sciweavers

524 search results - page 83 / 105
» Why phishing works
Sort
View
LION
2007
Springer
198views Optimization» more  LION 2007»
14 years 3 months ago
Multiobjective Landscape Analysis and the Generalized Assignment Problem
The importance of tuning a search algorithm for the specific features of the target search space has been known for quite some time. However, when dealing with multiobjective prob...
Deon Garrett, Dipankar Dasgupta
SIGCOMM
2005
ACM
14 years 3 months ago
Limitations of equation-based congestion control
We study limitations of an equation-based congestion control protocol, called TFRC (TCP Friendly Rate Control). It examines how the three main factors that determine TFRC throughp...
Injong Rhee, Lisong Xu
DIGRA
2005
Springer
14 years 3 months ago
Connecting Worlds. Fantasy Role-Playing Games, Ritual Acts and the Magic Circle
From a cultural history and game theoretical perspective my work focuses on the relationship between the fantasy subculture, fantasy role-playing games and the daily life of their...
Marinka Copier
ECML
2005
Springer
14 years 3 months ago
Nonrigid Embeddings for Dimensionality Reduction
Spectral methods for embedding graphs and immersing data manifolds in low-dimensional speaces are notoriously unstable due to insufficient and/or numberically ill-conditioned con...
Matthew Brand
CASES
2003
ACM
14 years 3 months ago
Compiler-decided dynamic memory allocation for scratch-pad based embedded systems
This paper presents a highly predictable, low overhead and yet dynamic, memory allocation strategy for embedded systems with scratch-pad memory. A scratch-pad is a fast compiler-m...
Sumesh Udayakumaran, Rajeev Barua