Sciweavers

12438 search results - page 2476 / 2488
» The Magic of a Number System
Sort
View
GAMESEC
2010
244views Game Theory» more  GAMESEC 2010»
13 years 6 months ago
The Password Game: Negative Externalities from Weak Password Practices
The combination of username and password is widely used as a human authentication mechanism on the Web. Despite this universal adoption and despite their long tradition, password s...
Sören Preibusch, Joseph Bonneau
GLOBECOM
2010
IEEE
13 years 6 months ago
Routing and Spectrum Allocation in OFDM-Based Optical Networks with Elastic Bandwidth Allocation
Orthogonal Frequency Division Multiplexing (OFDM) has been recently proposed as a modulation technique for optical networks, due to its good spectral efficiency and impairment tole...
Kostas Christodoulopoulos, Ioannis Tomkos, Emmanou...
GLOBECOM
2010
IEEE
13 years 6 months ago
Packet-Reliability-Based Decode-and-Forward Distributed Space-Time Shift Keying
Motivated by the recent concept of Space-Time Shift Keying (STSK), we propose a novel cooperative STSK scheme, which is capable of achieving a flexible rate-diversity tradeoff, in ...
Shinya Sugiura, Sheng Chen, Lajos Hanzo
ICPR
2010
IEEE
13 years 5 months ago
A Re-evaluation of Pedestrian Detection on Riemannian Manifolds
Abstract--Boosting covariance data on Riemannian manifolds has proven to be a convenient strategy in a pedestrian detection context. In this paper we show that the detection perfor...
Diego Tosato, Michela Farenzena, Marco Cristani, V...
IMC
2010
ACM
13 years 5 months ago
Listen to me if you can: tracking user experience of mobile network on social media
Social media sites such as Twitter continue to grow at a fast pace. People of all generations use social media to exchange messages and share experiences of their life in a timely...
Tongqing Qiu, Junlan Feng, Zihui Ge, Jia Wang, Jun...
« Prev « First page 2476 / 2488 Last » Next »