Sciweavers

7988 search results - page 1476 / 1598
» A Useful Undecidable Theory
Sort
View
167
Voted
GAMESEC
2010
244views Game Theory» more  GAMESEC 2010»
15 years 1 months ago
The Password Game: Negative Externalities from Weak Password Practices
The combination of username and password is widely used as a human authentication mechanism on the Web. Despite this universal adoption and despite their long tradition, password s...
Sören Preibusch, Joseph Bonneau
146
Voted
MOBIHOC
2010
ACM
15 years 1 months ago
On quality of monitoring for multi-channel wireless infrastructure networks
Passive monitoring utilizing distributed wireless sniffers is an effective technique to monitor activities in wireless infrastructure networks for fault diagnosis, resource manage...
Arun Chhetri, Huy Anh Nguyen, Gabriel Scalosub, Ro...
MOBIHOC
2010
ACM
15 years 1 months ago
Barrier coverage with sensors of limited mobility
Barrier coverage is a critical issue in wireless sensor networks for various battlefield and homeland security applications. The goal is to effectively detect intruders that attem...
Anwar Saipulla, Benyuan Liu, Guoliang Xing, Xinwen...
140
Voted
CLEF
2009
Springer
15 years 1 months ago
Users' Image Seeking Behavior in a Multilingual Tag Environment
: This paper presents the results of a user study conducted in the framework of the Interactive Image Retrieval task at CLEF 2009. The main goal of our research is to understand th...
Miguel E. Ruiz, Pok Chin
158
Voted
IC3
2009
15 years 1 months ago
Multi-scale Modeling and Analysis of Nano-RFID Systems on HPC Setup
In this paper we have worked out on some the complex modeling aspects such as Multi Scale modeling, MATLAB Sugar based modeling and have shown the complexities involved in the anal...
Rohit Pathak, Satyadhar Joshi
« Prev « First page 1476 / 1598 Last » Next »