Sciweavers

2086 search results - page 192 / 418
» Mathematical Theory Exploration
Sort
View
GLOBECOM
2009
IEEE
15 years 10 months ago
P2P-ISP Cooperation: Risks and Mitigation in Multiple-ISP Networks
—Several proposals on P2P-ISP cooperation have recently been developed using information sharing for localitybased peering. Their benefits in terms of P2P efficiency, ISP cost,...
Aliye Özge Kaya, Mung Chiang, Wade Trappe
EDUTAINMENT
2009
Springer
15 years 10 months ago
Entertaining Education - Using Games-Based and Service-Oriented Learning to Improve STEM Education
This paper addresses the development of a computer game design and development curriculum at the authors’ institution. The basis for curriculum decisions, as well as comparison t...
Jon Preston, Briana Morrison
CEC
2008
IEEE
15 years 10 months ago
Analysis of reproduction operator in Bacterial Foraging Optimization Algorithm
— One of the major driving forces of Bacterial Foraging Optimization Algorithm (BFOA) is the reproduction phenomenon of virtual bacteria each of which models one trial solution o...
Ajith Abraham, Arijit Biswas, Sambarta Dasgupta, S...
CTRSA
2007
Springer
110views Cryptology» more  CTRSA 2007»
15 years 10 months ago
Selecting Secure Passwords
We mathematically explore a model for the shortness and security for passwords that are stored in hashed form. The model is implicitly in the NIST publication [8] and is based on c...
Eric R. Verheul
126
Voted
DBPL
2007
Springer
100views Database» more  DBPL 2007»
15 years 10 months ago
Provenance as Dependency Analysis
Abstract. Provenance is information recording the source, derivation, or history of some information. Provenance tracking has been studied in a variety of settings; however, althou...
James Cheney, Amal Ahmed, Umut A. Acar