Sciweavers

524 search results - page 92 / 105
» Why phishing works
Sort
View
ICALP
2007
Springer
15 years 8 months ago
Universal Algebra and Hardness Results for Constraint Satisfaction Problems
We present algebraic conditions on constraint languages Γ that ensure the hardness of the constraint satisfaction problem CSP(Γ) for complexity classes L, NL, P, NP and ModpL. Th...
Benoit Larose, Pascal Tesson
98
Voted
OOPSLA
2007
Springer
15 years 8 months ago
Using early phase termination to eliminate load imbalances at barrier synchronization points
We present a new technique, early phase termination, for eliminating idle processors in parallel computations that use barrier synchronization. This technique simply terminates ea...
Martin C. Rinard
WLP
2007
Springer
15 years 8 months ago
spock: A Debugging Support Tool for Logic Programs under the Answer-Set Semantics
Answer-set programming (ASP) is an emerging logic-programming paradigm that strictly separates the description of a problem from its solving methods. Despite its semantic elegance,...
Martin Gebser, Jörg Pührer, Torsten Scha...
97
Voted
ELPUB
2006
ACM
15 years 7 months ago
Using a Walk Ontology for Capturing Language Independent Navigation Instructions
Walking is becoming increasingly popular as a leisure activity across Europe. Outdoor equipment has modernized, gained flexibility and lost weight. GPS devices are gaining popular...
Bert Paepen, Jan Engelen
130
Voted
AIRWEB
2005
Springer
15 years 7 months ago
Web Spam, Propaganda and Trust
Web spamming, the practice of introducing artificial text and links into web pages to affect the results of searches, has been recognized as a major problem for search engines. ...
Panagiotis Takis Metaxas, Joseph DeStefano