Sciweavers

444 search results - page 68 / 89
» Sensitive state-space exploration
Sort
View
CPAIOR
2007
Springer
15 years 6 months ago
Best-First AND/OR Search for 0/1 Integer Programming
Abstract. AND/OR search spaces are a unifying paradigm for advanced algorithmic schemes for graphical models. The main virtue of this representation is its sensitivity to the struc...
Radu Marinescu 0002, Rina Dechter
GECCO
2007
Springer
156views Optimization» more  GECCO 2007»
15 years 6 months ago
Nonlinearity linkage detection for financial time series analysis
Standard detection algorithms for nonlinearity linkage fail when applied to typical problems in the analysis of financial time-series data. We explain how this failure arises whe...
Theodore Chiotis, Christopher D. Clack
ICS
2007
Tsinghua U.
15 years 6 months ago
Tradeoff between data-, instruction-, and thread-level parallelism in stream processors
This paper explores the scalability of the Stream Processor architecture along the instruction-, data-, and thread-level parallelism dimensions. We develop detailed VLSI-cost and ...
Jung Ho Ahn, Mattan Erez, William J. Dally
ACSAC
2006
IEEE
15 years 5 months ago
KLASSP: Entering Passwords on a Spyware Infected Machine Using a Shared-Secret Proxy
In this paper we examine the problem of entering sensitive data, such as passwords, from an untrusted machine. By untrusted we mean that it is suspected to be infected with spywar...
Dinei A. F. Florêncio, Cormac Herley
SOUPS
2006
ACM
15 years 5 months ago
Decision strategies and susceptibility to phishing
Phishing emails are semantic attacks that con people into divulging sensitive information using techniques to make the user believe that information is being requested by a legiti...
Julie S. Downs, Mandy B. Holbrook, Lorrie Faith Cr...