Sciweavers

601 search results - page 45 / 121
» Verifiable Network-Performance Measurements
Sort
View
WWW
2006
ACM
15 years 10 months ago
Designing ethical phishing experiments: a study of (ROT13) rOnl query features
We study how to design experiments to measure the success rates of phishing attacks that are ethical and accurate, which are two requirements of contradictory forces. Namely, an e...
Markus Jakobsson, Jacob Ratkiewicz
WWW
2003
ACM
15 years 10 months ago
Techniques and Metrics for Improving Website Structure
In this work two distinct metrics are proposed, which aim to quantify the importance of a web page based on the visits it receives by the users and its location within the website...
Eleni Christopoulou, John D. Garofalakis, Christos...
INFOCOM
2009
IEEE
15 years 4 months ago
Fit a Spread Estimator in Small Memory
—The spread of a source host is the number of distinct destinations that it has sent packets to during a measurement period. A spread estimator is a software/hardware module on a...
MyungKeun Yoon, Tao Li, Shigang Chen, Jih-Kwon Pei...
CHARME
2003
Springer
97views Hardware» more  CHARME 2003»
15 years 1 months ago
Coverage Metrics for Formal Verification
In formal verification, we verify that a system is correct with respect to a specification. Even when the system is proven to be correct, there is still a question of how complete ...
Hana Chockler, Orna Kupferman, Moshe Y. Vardi
IJCV
2002
167views more  IJCV 2002»
14 years 9 months ago
On the Consistency of Instantaneous Rigid Motion Estimation
Instantaneous camera motion estimation is an important research topic in computer vision. Although in theory more than five points uniquely determine the solution in an ideal situa...
Tong Zhang, Carlo Tomasi