Sciweavers

191 search results - page 37 / 39
» Automated Spyware Collection and Analysis
Sort
View
SOUPS
2010
ACM
13 years 11 months ago
A closer look at recognition-based graphical passwords on mobile devices
Graphical password systems based on the recognition of photographs are candidates to alleviate current over-reliance on alphanumeric passwords and PINs. However, despite being bas...
Paul Dunphy, Andreas P. Heiner, N. Asokan
FLAIRS
2004
13 years 8 months ago
The Mobile Agents Integrated Field Test
The Mobile Agents model-based, distributed architecture, which integrates diverse components in a system for lunar and planetary surface operations, was extensively tested in a tw...
William J. Clancey, Maarten Sierhuis, Rich Alena, ...
BMCBI
2010
161views more  BMCBI 2010»
13 years 7 months ago
FRASS: the web-server for RNA structural comparison
Background: The impressive increase of novel RNA structures, during the past few years, demands automated methods for structure comparison. While many algorithms handle only small...
Svetlana Kirillova, Silvio C. E. Tosatto, Oliviero...
JANCL
2008
109views more  JANCL 2008»
13 years 7 months ago
Conditionalization and total knowledge
This paper employs epistemic logic to investigate the philosophical foundations of Bayesian updating in belief revision. By Bayesian updating, we understand the tenet that an agen...
Ian Pratt-Hartmann
JOT
2008
142views more  JOT 2008»
13 years 7 months ago
Mining Edgar Tender Offers
This paper describes how use the HTMLEditorKit to perform web data mining on EDGAR (Electronic Data-Gathering, Analysis, and Retrieval system). EDGAR is the SEC's (U.S. Secur...
Douglas Lyon