Sciweavers

520 search results - page 104 / 104
» Truthful Mechanisms for Exhibitions
Sort
View
GAMESEC
2010
244views Game Theory» more  GAMESEC 2010»
13 years 8 months ago
The Password Game: Negative Externalities from Weak Password Practices
The combination of username and password is widely used as a human authentication mechanism on the Web. Despite this universal adoption and despite their long tradition, password s...
Sören Preibusch, Joseph Bonneau
IPPS
2010
IEEE
13 years 8 months ago
Clustering JVMs with software transactional memory support
Affordable transparent clustering solutions to scale non-HPC applications on commodity clusters (such as Terracotta) are emerging for Java Virtual Machines (JVMs). Working in this ...
Christos Kotselidis, Mikel Luján, Mohammad ...
SIAMADS
2010
100views more  SIAMADS 2010»
13 years 5 months ago
Optimal Intrinsic Dynamics for Bursting in a Three-Cell Network
Previous numerical and analytical work has shown that synaptic coupling can allow a network of model neurons to synchronize despite heterogeneity in intrinsic parameter values. In ...
Justin R. Dunmyre, Jonathan E. Rubin
SIGCOMM
2012
ACM
12 years 1 months ago
Abstractions for network update
ions for Network Update Mark Reitblatt Cornell Nate Foster Cornell Jennifer Rexford Princeton Cole Schlesinger Princeton David Walker Princeton Configuration changes are a common...
Mark Reitblatt, Nate Foster, Jennifer Rexford, Col...

Publication
232views
13 years 9 months ago
Measurement in 802.11 Wireless Networks and its Applications
Ease of deployment, wireless connectivity and ubiquitous mobile on-the-go computing has made the IEEE 802.11 the most widely deployed Wireless Local Area Network (WLAN) sta...
Malik Ahmad Yar Khan