Sciweavers

918 search results - page 176 / 184
» New caching techniques for web search engines
Sort
View
AOSD
2003
ACM
15 years 5 months ago
Quantifying aspects in middleware platforms
Middleware technologies such as Web Services, CORBA and DCOM have been very successful in solving distributed computing problems for a large family of application domains. As midd...
Charles Zhang, Hans-Arno Jacobsen
WWW
2009
ACM
16 years 12 days ago
A hybrid phish detection approach by identity discovery and keywords retrieval
Phishing is a significant security threat to the Internet, which causes tremendous economic loss every year. In this paper, we proposed a novel hybrid phish detection method based...
Guang Xiang, Jason I. Hong
CSE
2009
IEEE
15 years 6 months ago
Bio-chaotic Stream Cipher-Based Iris Image Encryption
Conventional cryptography uses encryption key, which are long bit strings and are very hard to memorize such a long random numbers. Also it can be easily attacked by using the brut...
Abdullah Sharaf Alghamdi, Hanif Ullah, Maqsood Mah...
GECCO
2007
Springer
276views Optimization» more  GECCO 2007»
15 years 5 months ago
Automatic mutation test input data generation via ant colony
Fault-based testing is often advocated to overcome limitations of other testing approaches; however it is also recognized as being expensive. On the other hand, evolutionary algor...
Kamel Ayari, Salah Bouktif, Giuliano Antoniol
CHARME
2005
Springer
136views Hardware» more  CHARME 2005»
15 years 5 months ago
Acceleration of SAT-Based Iterative Property Checking
Today, verification is becoming the dominating factor for successful circuit designs. In this context formal verification techniques allow to prove the correctness of a circuit ...
Daniel Große, Rolf Drechsler