Sciweavers

13987 search results - page 2551 / 2798
» The Two Guards Problem
Sort
View
CCS
2009
ACM
14 years 9 months ago
Automatic discovery of botnet communities on large-scale communication networks
Botnets are networks of compromised computers infected with malicious code that can be controlled remotely under a common command and control (C&C) channel. Recognized as one ...
Wei Lu, Mahbod Tavallaee, Ali A. Ghorbani
CHI
2009
ACM
14 years 9 months ago
The accidental tutor: overlaying an intelligent tutor on an existing user interface
Intelligent Tutoring Systems (ITSs) have been shown to have dramatic impact on student learning [9]. However, these gains have been mostly in topics in which the interface has bee...
Liz Blankenship, Stephen B. Gilbert, Stephen Bless...
CHI
2009
ACM
14 years 9 months ago
A comparative study of interaction metaphors for large-scale displays
Large screen displays require new interaction techniques because of their physical size. Even though there are technologies that tackle the problem of interaction with such device...
Ricardo Jota, João Madeiras Pereira, Joaqui...
PODC
2009
ACM
14 years 9 months ago
Randomized mutual exclusion in O(log N / log log N) RMRs
d Abstract] Danny Hendler Department of Computer-Science Ben-Gurion University hendlerd@cs.bgu.ac.il Philipp Woelfel Department of Computer-Science University of Calgary woelfel@cp...
Danny Hendler, Philipp Woelfel
FSE
2009
Springer
118views Cryptology» more  FSE 2009»
14 years 8 months ago
Enhanced Target Collision Resistant Hash Functions Revisited
Enhanced Target Collision Resistance (eTCR) property for a hash function was put forth by Halevi and Krawczyk in Crypto 2006, in conjunction with the randomized hashing mode that i...
Mohammad Reza Reyhanitabar, Willy Susilo, Yi Mu
« Prev « First page 2551 / 2798 Last » Next »