Sciweavers

11588 search results - page 2252 / 2318
» Will They Like This
Sort
View
JAIR
2010
145views more  JAIR 2010»
13 years 7 months ago
On Action Theory Change
As historically acknowledged in the Reasoning about Actions and Change community, intuitiveness of a logical domain description cannot be fully automated. Moreover, like any other...
Ivan José Varzinczak
JCS
2010
135views more  JCS 2010»
13 years 7 months ago
New filtering approaches for phishing email
Phishing emails usually contain a message from a credible looking source requesting a user to click a link to a website where she/he is asked to enter a password or other confide...
André Bergholz, Jan De Beer, Sebastian Glah...
JCS
2010
104views more  JCS 2010»
13 years 7 months ago
Finding the PKI needles in the Internet haystack
Public-key cryptography can uniquely enable trust within distributed settings. Employing it usually requires deploying a set of tools and services collectively known as a public k...
Massimiliano Pala, Sean W. Smith
JOCN
2010
96views more  JOCN 2010»
13 years 7 months ago
Approaching the Bad and Avoiding the Good: Lateral Prefrontal Cortical Asymmetry Distinguishes between Action and Valence
■ Goal pursuit in humans sometimes involves approaching unpleasant and avoiding pleasant stimuli, such as when a dieter chooses to eat vegetables (although he does not like them...
Elliot T. Berkman, Matthew D. Lieberman
JUCS
2010
167views more  JUCS 2010»
13 years 7 months ago
Ontology based Approach in Knowledge Sharing Measurement
: For many years, physical asset indicators were the main evidence of an organization’s successful performance. However, the situation has changed following the revolution of inf...
Behrang Zadjabbari, Pornpit Wongthongtham, Farookh...
« Prev « First page 2252 / 2318 Last » Next »