Sciweavers

3732 search results - page 738 / 747
» Ubiquitous Computing for the Public
Sort
View
GAMESEC
2010
244views Game Theory» more  GAMESEC 2010»
13 years 4 months ago
The Password Game: Negative Externalities from Weak Password Practices
The combination of username and password is widely used as a human authentication mechanism on the Web. Despite this universal adoption and despite their long tradition, password s...
Sören Preibusch, Joseph Bonneau
ICIP
2010
IEEE
13 years 4 months ago
Decoding positional and color information from a coded pattern
: The paper presents decoding positional and color information using visual coded patterns for efficient geometric calibration and color consistency across multiple cameras. The pa...
Nelson L. Chang, Suk Hwan Lim, Feng Tang
SCN
2010
Springer
232views Communications» more  SCN 2010»
13 years 4 months ago
Authenticated Key Agreement with Key Re-use in the Short Authenticated Strings Model
Serge Vaudenay [20] introduced a notion of Message Authentication (MA) protocols in the Short Authenticated String (SAS) model. A SAS-MA protocol authenticates arbitrarily long mes...
Stanislaw Jarecki, Nitesh Saxena
SIGSOFT
2010
ACM
13 years 4 months ago
Scalable SMT-based verification of GPU kernel functions
Interest in Graphical Processing Units (GPUs) is skyrocketing due to their potential to yield spectacular performance on many important computing applications. Unfortunately, writ...
Guodong Li, Ganesh Gopalakrishnan
SODA
2010
ACM
174views Algorithms» more  SODA 2010»
13 years 4 months ago
Differentially Private Combinatorial Optimization
Consider the following problem: given a metric space, some of whose points are "clients," select a set of at most k facility locations to minimize the average distance f...
Anupam Gupta, Katrina Ligett, Frank McSherry, Aaro...