Sciweavers

10602 search results - page 43 / 2121
» Weakly Useful Sequences
Sort
View
SRDS
1993
IEEE
14 years 1 months ago
Some Remarks on Protecting Weak Keys and Poorly-Chosen Secrets from Guessing Attacks
Authentication and key distribution protocols that utilize weak secrets (such as passwords and PINs) are traditionally susceptible to guessing attacks whereby an adversary iterate...
Gene Tsudik, Els Van Herreweghen
DAWAK
2006
Springer
14 years 25 days ago
Mining Direct Marketing Data by Ensembles of Weak Learners and Rough Set Methods
This paper describes problem of prediction that is based on direct marketing data coming from Nationwide Products and Services Questionnaire (NPSQ) prepared by Polish division of A...
Jerzy Blaszczynski, Krzysztof Dembczynski, Wojciec...
FTCS
1993
97views more  FTCS 1993»
13 years 10 months ago
Virtually-Synchronous Communication Based on a Weak Failure Suspector
Failure detectors (or, more accurately Failure Suspectors { FS) appear to be a fundamental service upon which to build fault-tolerant, distributed applications. This paper shows t...
André Schiper, Aleta Ricciardi
CORR
2010
Springer
114views Education» more  CORR 2010»
13 years 7 months ago
On weakly optimal partitions in modular networks
Abstract. Modularity was introduced as a measure of goodness for the community structure induced by a partition of the set of vertices in a graph. Then, it also became an objective...
José Ignacio Alvarez-Hamelin, Beiró ...
HAPTICS
2011
IEEE
13 years 27 days ago
Weak spatial constancy in touch
We propose extending the concept of spatial constancy to haptic perception. In vision, spatial constancy refers to the conversion of retinotopic signals into spatiotopic represent...
Mark Wexler, Vincent Hayward