Sciweavers

844 search results - page 150 / 169
» Further results on concordance relations
Sort
View
SOUPS
2006
ACM
14 years 2 months ago
A comparison of perceived and real shoulder-surfing risks between alphanumeric and graphical passwords
Previous research has found graphical passwords to be more memorable than non-dictionary or “strong” alphanumeric passwords. Participants in a prior study expressed concerns t...
Furkan Tari, A. Ant Ozok, Stephen H. Holden
PADS
2004
ACM
14 years 2 months ago
Space-Parallel Network Simulations Using Ghosts
We discuss an approach for creating a federated network simulation that eases the burdens on the simulator user that typically arise from more traditional methods for defining sp...
George F. Riley, Talal M. Jaafar, Richard M. Fujim...
SASN
2004
ACM
14 years 2 months ago
Revisiting random key pre-distribution schemes for wireless sensor networks
Key management is one of the fundamental building blocks of security services. In a network with resource constrained nodes like sensor networks, traditional key management techni...
Joengmin Hwang, Yongdae Kim
RULEML
2004
Springer
14 years 2 months ago
Rule Learning for Feature Values Extraction from HTML Product Information Sheets
The Web is now a huge information repository with a rich semantic structure that, however, is primarily addressed to human understanding rather than automated processing by a compu...
Costin Badica, Amelia Badica
SIGCOMM
2003
ACM
14 years 2 months ago
Peer-to-peer information retrieval using self-organizing semantic overlay networks
Content-based full-text search is a challenging problem in Peer-toPeer (P2P) systems. Traditional approaches have either been centralized or use flooding to ensure accuracy of th...
Chunqiang Tang, Zhichen Xu, Sandhya Dwarkadas