Sciweavers

3335 search results - page 571 / 667
» Grid result checking
Sort
View
150
Voted
ICONIP
2009
15 years 1 months ago
HumanBoost: Utilization of Users' Past Trust Decision for Identifying Fraudulent Websites
In this paper, we present an approach that aims to study users' past trust decisions (PTDs) for improving the accuracy of detecting phishing sites. Generally, Web users requir...
Daisuke Miyamoto, Hiroaki Hazeyama, Youki Kadobaya...
AMAI
2010
Springer
15 years 1 months ago
Efficient approximate verification of B and Z models via symmetry markers
Abstract We present a new approximate verification technique for falsifying the invariants of B models. The technique employs symmetry of B models induced by the use of deferred se...
Michael Leuschel, Thierry Massart
137
Voted
IANDC
2011
91views more  IANDC 2011»
14 years 11 months ago
Queries on Xml streams with bounded delay and concurrency
Query answering algorithms on Xml streams check answer candidates on the fly in order to avoid the unnecessary buffering whenever possible. The delay and concurrency of a query ...
Olivier Gauwin, Joachim Niehren, Sophie Tison
145
Voted
JCS
2010
80views more  JCS 2010»
14 years 10 months ago
Constraint differentiation: Search-space reduction for the constraint-based analysis of security protocols
We introduce constraint differentiation, a powerful technique for reducing search when model-checking security protocols using constraint-based methods. Constraint differentiation...
Sebastian Mödersheim, Luca Viganò, Dav...
154
Voted
JCT
2010
79views more  JCT 2010»
14 years 10 months ago
Confinement of matroid representations to subsets of partial fields
Let M be a matroid representable over a (partial) field and B a matrix representable over a sub-partial field . We say that B confines M to if, whenever a -representation matrix ...
Rudi Pendavingh, Stefan H. M. van Zwam