Sciweavers

1737 search results - page 265 / 348
» Using Strategy Objectives for Network Security Analysis
Sort
View
154
Voted
GAMESEC
2010
244views Game Theory» more  GAMESEC 2010»
15 years 15 days ago
The Password Game: Negative Externalities from Weak Password Practices
The combination of username and password is widely used as a human authentication mechanism on the Web. Despite this universal adoption and despite their long tradition, password s...
Sören Preibusch, Joseph Bonneau
116
Voted
ICNSC
2008
IEEE
15 years 9 months ago
Mining the Royal Portrait Miniature for the Art Historical Context
— the eleventh-century royal portrait miniature painting of King Gagik-Abas of Kars, Queen Goranduxt, and Princess Marem is an important image within the realm of Armenian art hi...
Steve Read, Yu Cao, Hazel Antaramian-Hofman
ICNP
2002
IEEE
15 years 7 months ago
A Theory of Window-Based Unicast Congestion Control
This work presents a comprehensive theoretical framework for window-based congestion control protocols that are designed to converge to fairness and efficiency. We first derive ...
Nishanth R. Sastry, Simon S. Lam
JUCS
2010
139views more  JUCS 2010»
15 years 29 days ago
Gabor Filter Aided 3D Ultra-Sonography Diagnosis System with WLAN Transmission Consideration
: The Gabor filter aided diagnosis system for 3-dimensional ultra-sonography (3DUS) under the WLAN environment is introduced. Due to the important relationship between breast tumou...
Wei-Ming Chen, Chi-Hsiang Lo, Han-Chieh Chao, Chun...
IPPS
2003
IEEE
15 years 7 months ago
Parallelisation of IBD Computation for Determining Genetic Disease Map
A number of software packages are available for the construction of comprehensive human genetic maps. In this paper we parallelize the widely used package Genehunter. We restrict ...
Nouhad J. Rizk