Sciweavers

9842 search results - page 1624 / 1969
» Compositional timing analysis
Sort
View
FC
2010
Springer
160views Cryptology» more  FC 2010»
15 years 8 months ago
Measuring the Perpetrators and Funders of Typosquatting
We describe a method for identifying “typosquatting”, the intentional registration of misspellings of popular website addresses. We estimate that at least 938 000 typosquatting...
Tyler Moore, Benjamin Edelman
KDD
2010
ACM
218views Data Mining» more  KDD 2010»
15 years 8 months ago
Online multiscale dynamic topic models
We propose an online topic model for sequentially analyzing the time evolution of topics in document collections. Topics naturally evolve with multiple timescales. For example, so...
Tomoharu Iwata, Takeshi Yamada, Yasushi Sakurai, N...
ESEM
2007
ACM
15 years 8 months ago
An Empirical Study of the Effects of Gestalt Principles on Diagram Understandability
Comprehension errors in software design must be detected at their origin to avoid propagation into later portions of the software lifecycle and also the final system. This researc...
Krystle Lemon, Edward B. Allen, Jeffrey C. Carver,...
PODC
2010
ACM
15 years 8 months ago
Brief announcement: towards robust medium access in multi-hop networks
This paper introduces the distributed MAC protocol Jade. We consider a multi-hop wireless network with a single communication channel in which a powerful adversary is able to jam ...
Andréa W. Richa, Jin Zhang, Christian Schei...
EUC
2007
Springer
15 years 8 months ago
An Efficient Authentication Protocol for RFID Systems Resistant to Active Attacks
Traditional cryptographic primitives are not supported on low-cost RFID tags since, at most, 4K gates can be devoted to securityrelated tasks. Despite this, there are a vast number...
Pedro Peris-Lopez, Julio César Herná...
« Prev « First page 1624 / 1969 Last » Next »