Sciweavers

247 search results - page 29 / 50
» Session-Key Generation Using Human Passwords Only
Sort
View
127
Voted
CHI
2006
ACM
15 years 6 months ago
Representation of interwoven surfaces in 2 1/2 D drawing
The state-of-the-art in computer drawing programs is based on a number of concepts that are over two decades old. One such concept is the use of layers for ordering the surfaces i...
Keith Wiley, Lance R. Williams
122
Voted
ACG
2009
Springer
15 years 9 months ago
Plans, Patterns, and Move Categories Guiding a Highly Selective Search
In this paper we present our ideas for an Arimaa-playing program (also called a bot) that uses plans and pattern matching to guide a highly selective search. We restrict move gener...
Gerhard Trippen
KDD
2001
ACM
216views Data Mining» more  KDD 2001»
16 years 2 months ago
Real world performance of association rule algorithms
This study compares five well-known association rule algorithms using three real-world datasets and an artificial dataset. The experimental results confirm the performance improve...
Zijian Zheng, Ron Kohavi, Llew Mason
IMC
2010
ACM
15 years 13 days ago
Selecting representative IP addresses for internet topology studies
An Internet hitlist is a set of addresses that cover and can represent the the Internet as a whole. Hitlists have long been used in studies of Internet topology, reachability, and...
Xun Fan, John Heidemann
149
Voted
JUCS
2006
123views more  JUCS 2006»
15 years 2 months ago
Persian/Arabic Baffletext CAPTCHA
: Nowadays, many daily human activities such as education, trade, talks, etc are done by using the Internet. In such things as registration on Internet web sites, hackers write pro...
Mohammad Hassan Shirali-Shahreza, Mohammad Shirali...