Sciweavers

6229 search results - page 1094 / 1246
» Models of Computation for Networks on Chip
Sort
View
CCS
2008
ACM
14 years 8 days ago
Provably secure browser-based user-aware mutual authentication over TLS
The standard solution for user authentication on the Web is to establish a TLS-based secure channel in server authenticated mode and run a protocol on top of TLS where the user en...
Sebastian Gajek, Mark Manulis, Ahmad-Reza Sadeghi,...
COCOON
2008
Springer
14 years 2 days ago
Spreading Messages
Abstract. We model a network in which messages spread by a simple directed graph G = (V, E) [1] and a function : V N mapping each v V to a positive integer less than or equal to...
Ching-Lueh Chang, Yuh-Dauh Lyuu
ECSCW
2003
13 years 11 months ago
Discovery of Implicit and Explicit Connections Between People Using Email Utterance
This paper is about finding explicit and implicit connections between people by mining semantic associations from their email communications. Following from a sociocognitive stance...
Robert McArthur, Peter Bruza
JCO
2006
67views more  JCO 2006»
13 years 10 months ago
Resource allocation for restoration of compromised systems
Computer systems are constantly under the threats of being attacked and in many cases these attacks succeed. Today's networked systems are thus built to be intrusion tolerant....
Qunwei Zheng, Sibabrata Ray, Xiaoyan Hong
DSP
2007
13 years 10 months ago
Feasibility of impact-acoustic emissions for detection of damaged wheat kernels
A non-destructive, real time device was developed to detect insect damage, sprout damage, and scab damage in kernels of wheat. Kernels are impacted onto a steel plate and the resu...
Tom C. Pearson, A. Enis Çetin, Ahmed H. Tew...
« Prev « First page 1094 / 1246 Last » Next »