Sciweavers

7536 search results - page 222 / 1508
» The CLEAR 2007 Evaluation
Sort
View
FC
2007
Springer
111views Cryptology» more  FC 2007»
14 years 2 months ago
An Evaluation of Extended Validation and Picture-in-Picture Phishing Attacks
Abstract. In this usability study of phishing attacks and browser antiphishing defenses, 27 users each classified 12 web sites as fraudulent or legitimate. By dividing these users...
Collin Jackson, Daniel R. Simon, Desney S. Tan, Ad...
GECCO
2007
Springer
293views Optimization» more  GECCO 2007»
14 years 2 months ago
Solving the artificial ant on the Santa Fe trail problem in 20, 696 fitness evaluations
In this paper, we provide an algorithm that systematically considers all small trees in the search space of genetic programming. These small trees are used to generate useful subr...
Steffen Christensen, Franz Oppacher
HPCC
2007
Springer
14 years 2 months ago
Performance Evaluation of Distributed Computing over Heterogeneous Networks
RWAPI is a low-level communication interface designed for clusters of PCs. It has been developed to provide performance to higher applications on a wide variety of architectures. W...
Ouissem Ben Fredj, Éric Renault
OTM
2007
Springer
14 years 2 months ago
An Evaluation of Triple-Store Technologies for Large Data Stores
Abstract. This paper presents a comparison of performance of various triplestore technologies currently in either production release or beta test. Our comparison of triple-store te...
Kurt Rohloff, Mike Dean, Ian Emmons, Dorene Ryder,...
PADL
2007
Springer
14 years 2 months ago
Applications, Implementation and Performance Evaluation of Bit Stream Programming in Erlang
Writing code that manipulates bit streams is a painful and error-prone programming task, often performed via bit twiddling techniques such as explicit bit shifts and bit masks in p...
Per Gustafsson, Konstantinos F. Sagonas