Sciweavers

464 search results - page 73 / 93
» Identity Management for Self-Portrayal
Sort
View
IDA
1999
Springer
14 years 21 days ago
Reasoning about Input-Output Modeling of Dynamical Systems
The goal of input-output modeling is to apply a test input to a system, analyze the results, and learn something useful from the causeeffect pair. Any automated modeling tool that...
Matthew Easley, Elizabeth Bradley
BIOCOMP
2006
13 years 9 months ago
Filtering Tandem Repeats in DNA Sequences
A tandem repeat is a sequence of two or more contiguous, approximate copies of a pattern. Tandem repeats occur in the genomes of both eukaryotic and prokaryotic organisms. They ar...
Dina Sokol, Justin Tojeira
CN
2007
90views more  CN 2007»
13 years 8 months ago
SweetBait: Zero-hour worm detection and containment using low- and high-interaction honeypots
As next-generation computer worms may spread within minutes to millions of hosts, protection via human intervention is no longer an option. We discuss the implementation of SweetB...
Georgios Portokalidis, Herbert Bos
METRICS
1996
IEEE
14 years 18 days ago
Evaluating the Impact of Object-Oriented Design on Software Quality
This paper describes the results of a study where the impact of Object-Oriented design on software quality characteristics is experimentally evaluated. A suite of metrics for OO d...
Fernando Brito e Abreu, Walcélio L. Melo
ICISS
2007
Springer
14 years 9 days ago
A Zero Knowledge Password Proof Mutual Authentication Technique Against Real-Time Phishing Attacks
Phishing attack is a kind of identity theft trying to steal confidential data. Existing approaches against phishing attacks cannot prevent real-time phishing attacks. This paper pr...
Mohsen Sharifi, Alireza Saberi, Mojtaba Vahidi, Mo...