Sciweavers

1512 search results - page 282 / 303
» When Suboptimal Rules
Sort
View
CCS
2005
ACM
14 years 4 months ago
Fast dictionary attacks on passwords using time-space tradeoff
Human-memorable passwords are a mainstay of computer security. To decrease vulnerability of passwords to bruteforce dictionary attacks, many organizations enforce complicated pass...
Arvind Narayanan, Vitaly Shmatikov
CEAS
2005
Springer
14 years 4 months ago
Searching For John Doe: Finding Spammers and Phishers
Microsoft has prosecuted a vigorous civil enforcement campaign against spammers and phishers. When initial investigation into a spam or phishing case fails to reveal the identity ...
Aaron E. Kornblum
DIGRA
2005
Springer
14 years 4 months ago
The Pervasive Interface; Tracing the Magic Circle
This paper is an addition to the discourse surrounding interface theory and pervasive games. A buzzword by nature, the term ´interface´ needs to be investigated and redefined in...
Eva Nieuwdorp
ERCIMDL
2005
Springer
109views Education» more  ERCIMDL 2005»
14 years 4 months ago
MedioVis - A User-Centred Library Metadata Browser
MedioVis is a visual information seeking system which was designed especially for library data. The objective target was to create a system which simplifies and optimizes the userâ...
Christian Grün, Jens Gerken, Hans-Christian J...
GECCO
2005
Springer
161views Optimization» more  GECCO 2005»
14 years 4 months ago
Autonomous navigation system applied to collective robotics with ant-inspired communication
Research in collective robotics is motivated mainly by the possibility of achieving an efficient solution to multi-objective navigation tasks when multiple robots are employed, in...
Renato Reder Cazangi, Fernando J. Von Zuben, Maur&...