Abstract. In this usability study of phishing attacks and browser antiphishing defenses, 27 users each classified 12 web sites as fraudulent or legitimate. By dividing these users...
Collin Jackson, Daniel R. Simon, Desney S. Tan, Ad...
In this paper, we provide an algorithm that systematically considers all small trees in the search space of genetic programming. These small trees are used to generate useful subr...
RWAPI is a low-level communication interface designed for clusters of PCs. It has been developed to provide performance to higher applications on a wide variety of architectures. W...
Abstract. This paper presents a comparison of performance of various triplestore technologies currently in either production release or beta test. Our comparison of triple-store te...
Kurt Rohloff, Mike Dean, Ian Emmons, Dorene Ryder,...
Writing code that manipulates bit streams is a painful and error-prone programming task, often performed via bit twiddling techniques such as explicit bit shifts and bit masks in p...