Sciweavers

148 search results - page 27 / 30
» Exploiting Semantics for Event Detection Systems
Sort
View
ECRIME
2007
13 years 11 months ago
Evaluating a trial deployment of password re-use for phishing prevention
We propose a scheme that exploits scale to prevent phishing. We show that while stopping phishers from obtaining passwords is very hard, detecting the fact that a password has bee...
Dinei A. F. Florêncio, Cormac Herley
AEI
2010
136views more  AEI 2010»
13 years 7 months ago
Bridging the sense-reasoning gap: DyKnow - Stream-based middleware for knowledge processing
nizing multiple forms of information and knowledge processing on different levels of abstraction in a structured and principled manner. We propose knowledge processing middleware a...
Fredrik Heintz, Jonas Kvarnström, Patrick Doh...
NFM
2011
223views Formal Methods» more  NFM 2011»
13 years 2 months ago
Generating Data Race Witnesses by an SMT-Based Analysis
Abstract. Data race is one of the most dangerous errors in multithreaded programming, and despite intensive studies, it remains a notorious cause of failures in concurrent systems....
Mahmoud Said, Chao Wang, Zijiang Yang, Karem Sakal...

Publication
283views
12 years 6 months ago
Security and Surveillance
Human eyes are highly efficient devices for scanning through a large quantity of low-level visual sensory data and delivering selective information to one’s brain for high-level...
Shaogang Gong, Chen Change Loy, Tao Xiang
ESWS
2009
Springer
14 years 2 months ago
A Reasoning-Based Support Tool for Ontology Mapping Evaluation
In this paper we describe a web-based tool that supports the human in revising ontology alignments. Our tool uses logical reasoning as a basis for detecting conflicts in mappings ...
Christian Meilicke, Heiner Stuckenschmidt, Ondrej ...