Sciweavers

2446 search results - page 378 / 490
» Polyadic Concept Analysis
Sort
View
ICC
2008
IEEE
134views Communications» more  ICC 2008»
14 years 4 months ago
Secret Little Functions and Codebook for Protecting Users from Password Theft
—In this paper, we discuss how to prevent users’ passwords from being stolen by adversaries. We propose differentiated security mechanisms in which a user has the freedom to ch...
Yang Xiao, Chung-Chih Li, Ming Lei, Susan V. Vrbsk...
IEEEARES
2008
IEEE
14 years 4 months ago
A Lightweight Security Analyzer inside GCC
This paper describes the design and implementation of a lightweight static security analyzer that exploits the compilation process of the gcc compiler. The tool is aimed at giving...
Davide Pozza, Riccardo Sisto
INFOCOM
2008
IEEE
14 years 4 months ago
BAKE: A Balanced Kautz Tree Structure for Peer-to-Peer Networks
Abstract—In order to improve scalability and reduce maintenance overhead for structured Peer-to-Peer systems, researchers design optimal architectures with constant degree and lo...
Deke Guo, Yunhao Liu, Xiang-Yang Li
ISPDC
2008
IEEE
14 years 4 months ago
Token Loss Detection for Random Walk based Algorithm
Self-stabilizing token circulation algorithms are not always adapted for dynamic networks. Random walks are well known to play a crucial role in the design of randomized algorithm...
Thibault Bernard, Alain Bui, Devan Sohier
PIMRC
2008
IEEE
14 years 4 months ago
Adaptive radio resource management for a cellular system with fixed relay nodes
— Future mobile communications systems demand for higher data rates and service quality compared to state-of-the-art systems. One way to achieve this ambitious goal is to use rel...
Fredrik Boye, Peter Rost, Gerhard Fettweis