Sciweavers

759 search results - page 101 / 152
» What Can Be Implemented Anonymously
Sort
View
ACG
2006
Springer
14 years 3 months ago
Automatic Generation of Search Engines
A plethora of enhancements are available to be used together with the αβ search algorithm. There are so many, that their selection and implementation is a non-trivial task, even ...
Markian Hlynka, Jonathan Schaeffer
SAC
2006
ACM
14 years 3 months ago
Ubiquitous presence systems
Instant messaging has become a part of our daily live. Instant communication, either with a mobile device or with a computer based application, is an increasingly used form of com...
Matthias Kranz, Paul Holleis, Albrecht Schmidt
ACSAC
2005
IEEE
14 years 3 months ago
Graphical Passwords: A Survey
The most common computer authentication method is to use alphanumerical usernames and passwords. This method has been shown to have significant drawbacks. For example, users tend ...
Xiaoyuan Suo, Ying Zhu, G. Scott Owen
DSN
2005
IEEE
14 years 3 months ago
Assured Reconfiguration of Fail-Stop Systems
Hardware dependability improvements have led to a situation in which it is sometimes unnecessary to employ extensive hardware replication to mask hardware faults. Expanding upon o...
Elisabeth A. Strunk, John C. Knight, M. Anthony Ai...
HICSS
2005
IEEE
171views Biometrics» more  HICSS 2005»
14 years 3 months ago
An Architecture and Business Model for Making Software Agents Commercially Viable
While several research projects have been proposed to use software agents to deal with information overload, their results are not applicable in the existing Web infrastructure ma...
Qusay H. Mahmoud, Leslie Yu