Sciweavers

3937 search results - page 641 / 788
» Questioning Ubiquitous Computing
Sort
View
INFOCOM
2006
IEEE
14 years 2 months ago
End-to-End Service Quality Measurement Using Source-Routed Probes
— The need to monitor real time network services has prompted service providers to use new measurement technologies, such as service-specific probes. Service-specific probes ar...
Fei Li, Marina Thottan
STOC
2006
ACM
112views Algorithms» more  STOC 2006»
14 years 2 months ago
Limitations of quantum coset states for graph isomorphism
It has been known for some time that graph isomorphism reduces to the hidden subgroup problem (HSP). What is more, most exponential speedups in quantum computation are obtained by...
Sean Hallgren, Cristopher Moore, Martin Rötte...
ACSAC
2005
IEEE
14 years 1 months ago
Graphical Passwords: A Survey
The most common computer authentication method is to use alphanumerical usernames and passwords. This method has been shown to have significant drawbacks. For example, users tend ...
Xiaoyuan Suo, Ying Zhu, G. Scott Owen
HICSS
2005
IEEE
146views Biometrics» more  HICSS 2005»
14 years 1 months ago
Open Source Enterprise Systems: Towards a Viable Alternative
Enterprise systems are located within the antinomy of appearing as generic product, while being means of multiple integrations for the user through configuration and customisation...
Alexander Dreiling, Helmut Klaus, Michael Rosemann...
HOTI
2005
IEEE
14 years 1 months ago
SIFT: Snort Intrusion Filter for TCP
Intrusion rule processing in reconfigurable hardware enables intrusion detection and prevention services to run at multi Gigabit/second rates. High-level intrusion rules mapped d...
Michael Attig, John W. Lockwood