Sciweavers

490 search results - page 58 / 98
» Impossibilities for roommate problems
Sort
View
CHI
2010
ACM
14 years 3 months ago
The secure haptic keypad: a tactile password system
Authentication in public spaces poses significant security risks. Most significantly, passwords can be stolen, potentially leading to fraud. A common method to steal a PIN is thro...
Andrea Bianchi, Ian Oakley, Dong Soo Kwon
P2P
2009
IEEE
112views Communications» more  P2P 2009»
14 years 3 months ago
SyMon: Defending large structured P2P systems against Sybil Attack
Sybil attack is one of the most challenging problems that plague current decentralized Peer-to-Peer systems. In Sybil attack, a single malicious user creates multiple peer identit...
B. S. Jyothi, D. Janakiram
P2P
2009
IEEE
126views Communications» more  P2P 2009»
14 years 3 months ago
Robust Lifetime Measurement in Large-Scale P2P Systems with Non-Stationary Arrivals
—Characterizing user churn has become an important topic in studying P2P networks, both in theoretical analysis and system design. Recent work [26] has shown that direct sampling...
Xiaoming Wang, Zhongmei Yao, Yueping Zhang, Dmitri...
ICPP
2009
IEEE
14 years 3 months ago
Exploring the Cost-Availability Tradeoff in P2P Storage Systems
—P2P storage systems use replication to provide a certain level of availability. While the system must generate new replicas to replace replicas lost to permanent failures, it ca...
Zhi Yang, Yafei Dai, Zhen Xiao
GECCO
2009
Springer
113views Optimization» more  GECCO 2009»
14 years 3 months ago
Environmental robustness in multi-agent teams
Evolution has proven to be an effective method of training heterogeneous multi-agent teams of autonomous agents to explore unknown environments. Autonomous, heterogeneous agents ...
Terence Soule, Robert B. Heckendorn