Sciweavers

524 search results - page 92 / 105
» Why phishing works
Sort
View
ICALP
2007
Springer
14 years 3 months ago
Universal Algebra and Hardness Results for Constraint Satisfaction Problems
We present algebraic conditions on constraint languages Γ that ensure the hardness of the constraint satisfaction problem CSP(Γ) for complexity classes L, NL, P, NP and ModpL. Th...
Benoit Larose, Pascal Tesson
OOPSLA
2007
Springer
14 years 3 months ago
Using early phase termination to eliminate load imbalances at barrier synchronization points
We present a new technique, early phase termination, for eliminating idle processors in parallel computations that use barrier synchronization. This technique simply terminates ea...
Martin C. Rinard
WLP
2007
Springer
14 years 3 months ago
spock: A Debugging Support Tool for Logic Programs under the Answer-Set Semantics
Answer-set programming (ASP) is an emerging logic-programming paradigm that strictly separates the description of a problem from its solving methods. Despite its semantic elegance,...
Martin Gebser, Jörg Pührer, Torsten Scha...
ELPUB
2006
ACM
14 years 3 months ago
Using a Walk Ontology for Capturing Language Independent Navigation Instructions
Walking is becoming increasingly popular as a leisure activity across Europe. Outdoor equipment has modernized, gained flexibility and lost weight. GPS devices are gaining popular...
Bert Paepen, Jan Engelen
AIRWEB
2005
Springer
14 years 3 months ago
Web Spam, Propaganda and Trust
Web spamming, the practice of introducing artificial text and links into web pages to affect the results of searches, has been recognized as a major problem for search engines. ...
Panagiotis Takis Metaxas, Joseph DeStefano