Sciweavers

59 search results - page 6 / 12
» Sharing Revisited
Sort
View
JUCS
2008
166views more  JUCS 2008»
13 years 7 months ago
Bilateral Unknown Key-Share Attacks in Key Agreement Protocols
Unknown Key-Share (UKS) resilience is a basic security attribute in authenticated key agreement protocols, whereby two entities A and B should not be able to be coerced into shari...
Liqun Chen, Qiang Tang
INTERACT
2007
13 years 9 months ago
S3: Storable, Shareable Search
We present S3 , a system that implicitly captures the process and products of Web investigations (exploratory searches involving multiple queries). This automatically-created, pers...
Meredith Ringel Morris, Eric Horvitz
SIGMETRICS
2005
ACM
197views Hardware» more  SIGMETRICS 2005»
14 years 1 months ago
On the performance characteristics of WLANs: revisited
Wide-spread deployment of infrastructure WLANs has made Wi-Fi an integral part of today’s Internet access technology. Despite its crucial role in affecting end-to-end performan...
Sunwoong Choi, Kihong Park, Chong-kwon Kim
MOBICOM
2004
ACM
14 years 1 months ago
Revisiting the TTL-based controlled flooding search: optimality and randomization
In this paper we consider the problem of searching for a node or an object (i.e., piece of data, file, etc.) in a large network. Applications of this problem include searching fo...
Nicholas B. Chang, Mingyan Liu
ECCV
2010
Springer
14 years 1 months ago
Backprojection Revisited: Scalable Multi-view Object Detection and Similarity Metrics for Detections
Hough transform based object detectors learn a mapping from the image domain to a Hough voting space. Within this space, object hypotheses are formed by local maxima. The votes con...