Sciweavers

14895 search results - page 2934 / 2979
» Evaluating The Regret System
Sort
View
CN
2008
100views more  CN 2008»
13 years 10 months ago
Building resilient low-diameter peer-to-peer topologies
As more applications rely on underlying peer-to-peer topologies, the need for efficient and resilient infrastructure has become more pressing. A number of important classes of top...
Rita H. Wouhaybi, Andrew T. Campbell
CN
2008
98views more  CN 2008»
13 years 10 months ago
Description and simulation of dynamic mobility networks
During the last decade, the study of large scale complex networks has attracted a substantial amount of attention and works from several domains: sociology, biology, computer scie...
Antoine Scherrer, Pierre Borgnat, Eric Fleury, Jea...
CORR
2010
Springer
175views Education» more  CORR 2010»
13 years 10 months ago
Detecting Security threats in the Router using Computational Intelligence
Information security is an issue of global concern. As the Internet is delivering great convenience and benefits to the modern society, the rapidly increasing connectivity and acc...
J. Visumathi, K. L. Shunmuganathan
CORR
2010
Springer
84views Education» more  CORR 2010»
13 years 10 months ago
On the Security of Non-Linear HB (NLHB) Protocol Against Passive Attack
As a variant of the HB authentication protocol for RFID systems, which relies on the complexity of decoding linear codes against passive attacks, Madhavan et al. presented Non-Line...
Mohammad Reza Sohizadeh Abyaneh
CORR
2008
Springer
98views Education» more  CORR 2008»
13 years 10 months ago
The Physical World as a Virtual Reality
This paper explores the idea that the universe is a virtual reality created by information processing, and relates this strange idea to the findings of modern physics about the ph...
Brian Whitworth
« Prev « First page 2934 / 2979 Last » Next »