Sciweavers

5123 search results - page 111 / 1025
» Performance and Security Tradeoff
Sort
View
167
Voted
BIBE
2008
IEEE
142views Bioinformatics» more  BIBE 2008»
15 years 11 months ago
Optimizing performance, cost, and sensitivity in pairwise sequence search on a cluster of PlayStations
— The Smith-Waterman algorithm is a dynamic programming method for determining optimal local alignments between nucleotide or protein sequences. However, it suffers from quadrati...
Ashwin M. Aji, Wu-chun Feng
UMUAI
1998
128views more  UMUAI 1998»
15 years 4 months ago
Using Decision Trees for Agent Modeling: Improving Prediction Performance
A modeling system may be required to predict an agent’s future actions under constraints of inadequate or contradictory relevant historical evidence. This can result in low predi...
Bark Cheung Chiu, Geoffrey I. Webb
108
Voted
GLOBECOM
2009
IEEE
15 years 11 months ago
Multihop MIMO Relay Networks with ARQ
—A multiple antenna multihop relay network consisting of a source, a relay, and a destination node, is considered. The diversity-multiplexing-delay tradeoffs (DMDT) for various m...
Yao Xie, Deniz Gündüz, Andrea J. Goldsmi...
ICC
2008
IEEE
134views Communications» more  ICC 2008»
15 years 11 months ago
Secret Little Functions and Codebook for Protecting Users from Password Theft
—In this paper, we discuss how to prevent users’ passwords from being stolen by adversaries. We propose differentiated security mechanisms in which a user has the freedom to ch...
Yang Xiao, Chung-Chih Li, Ming Lei, Susan V. Vrbsk...
SPW
2004
Springer
15 years 10 months ago
Accountable Privacy
Hardly a day passes without reports of new threats in or about the Internet. Denial of service, worms, viruses, spam, and divulged credit card information highlight the major secu...
Mike Burmester, Yvo Desmedt, Rebecca N. Wright, Al...