Sciweavers

4529 search results - page 883 / 906
» Position Based Cryptography
Sort
View
JSAC
2006
95views more  JSAC 2006»
13 years 11 months ago
Impact of Packet Sampling on Portscan Detection
Abstract-- Packet sampling is commonly deployed in highspeed backbone routers to minimize resources used for network monitoring. It is known that packet sampling distorts traffic s...
Jianning Mai, Ashwin Sridharan, Chen-Nee Chuah, Hu...
FIRSTMONDAY
2007
141views more  FIRSTMONDAY 2007»
13 years 11 months ago
Scholarly publishing in sub-Saharan Africa in the twenty-first century: Challenges and opportunities
A free flow of ideas and information is vital to the process of scientific inquiry, and in turn to the ability to address economic, environmental and social development issues bot...
Ezra Ondari-Okemwa
PE
2008
Springer
167views Optimization» more  PE 2008»
13 years 11 months ago
Analysis of ratings on trust inference in open environments
Ratings (also known as recommendations) provide an efficient and effective way to build trust relationship in the human society, by making use of the information from others rathe...
Zhengqiang Liang, Weisong Shi
PRESENCE
2008
148views more  PRESENCE 2008»
13 years 11 months ago
Usability of Multi-Scale Interfaces for 3D Workbench Displays
We consider that multi-scale visualization interfaces support users to view different levels of scales simultaneously and to understand large-scale, complex 3D information in 3D d...
Ji-Young Oh, Hong Hua
SIAMSC
2008
123views more  SIAMSC 2008»
13 years 11 months ago
Balanced Incomplete Factorization
In this paper we present a new incomplete factorization of a square matrix into triangular factors in which we get standard LU or LDLT factors (direct factors) and their inverses (...
Rafael Bru, José Marín, José ...