Sciweavers

245 search results - page 29 / 49
» Letter from the chair
Sort
View
CCS
2005
ACM
14 years 1 months ago
Fast dictionary attacks on passwords using time-space tradeoff
Human-memorable passwords are a mainstay of computer security. To decrease vulnerability of passwords to bruteforce dictionary attacks, many organizations enforce complicated pass...
Arvind Narayanan, Vitaly Shmatikov
AUSAI
2006
Springer
13 years 11 months ago
Turkish Fingerspelling Recognition System Using Axis of Least Inertia Based Fast Alignment
Fingerspelling is used in sign language to spell out names of people and places for which there is no sign or for which the sign is not known. In this work we describe a Turkish fi...
Oguz Altun, Songül Albayrak, Ali Ekinci, Behz...
DLT
2007
13 years 9 months ago
Duplication Roots
Recently the duplication closure of words and languages has received much interest. We investigate a reversal of it: the duplication root reduces a word to a square-free one. After...
Peter Leupold
LREC
2010
179views Education» more  LREC 2010»
13 years 9 months ago
A Context Sensitive Variant Dictionary for Supporting Variant Selection
In Japanese, there are a large number of notational variants of words. This is because Japanese words are written in three kinds of characters: kanji (Chinese) characters, hiragar...
Aya Nishikawa, Ryo Nishimura, Yasuhiko Watanabe, Y...
CORR
2010
Springer
70views Education» more  CORR 2010»
13 years 7 months ago
Simultaneous communication in noisy channels
A sender wishes to broadcast a message of length n over an alphabet of size k to r users, where each user i, 1 i r should be able to receive one of possible mi messages. The cha...
Amit Weinstein