Sciweavers

2028 search results - page 402 / 406
» Highly Predictive Blacklisting
Sort
View
GAMESEC
2010
244views Game Theory» more  GAMESEC 2010»
13 years 5 months ago
The Password Game: Negative Externalities from Weak Password Practices
The combination of username and password is widely used as a human authentication mechanism on the Web. Despite this universal adoption and despite their long tradition, password s...
Sören Preibusch, Joseph Bonneau
ICDM
2010
IEEE
273views Data Mining» more  ICDM 2010»
13 years 5 months ago
Learning Maximum Lag for Grouped Graphical Granger Models
Temporal causal modeling has been a highly active research area in the last few decades. Temporal or time series data arises in a wide array of application domains ranging from med...
Amit Dhurandhar
ICPADS
2010
IEEE
13 years 5 months ago
Data-Aware Task Scheduling on Multi-accelerator Based Platforms
To fully tap into the potential of heterogeneous machines composed of multicore processors and multiple accelerators, simple offloading approaches in which the main trunk of the ap...
Cédric Augonnet, Jérôme Clet-O...
MM
2010
ACM
191views Multimedia» more  MM 2010»
13 years 5 months ago
Quantifying tag representativeness of visual content of social images
Social tags describe images from many aspects including the visual content observable from the images, the context and usage of images, user opinions and others. Not all tags are ...
Aixin Sun, Sourav S. Bhowmick
SECON
2010
IEEE
13 years 5 months ago
Adaptive Instantiation of the Protocol Interference Model in Mission-Critical Wireless Networks
Interference model is the basis of MAC protocol design in wireless networks, and it directly affects the efficiency and predictability of wireless messaging. To exploit the strengt...
Xin Che, Xiaohui Liu, Xi Ju, Hongwei Zhang