Sciweavers

448 search results - page 75 / 90
» Who is in Control
Sort
View
IWSEC
2009
Springer
15 years 10 months ago
ID-Based Group Password-Authenticated Key Exchange
Abstract—Password-authenticated key exchange (PAKE) protocols are designed to be secure even when the secret key used for authentication is a human-memorable password. In this pa...
Xun Yi, Raylin Tso, Eiji Okamoto
148
Voted
CCS
2007
ACM
15 years 9 months ago
How much anonymity does network latency leak?
Low-latency anonymity systems such as Tor, AN.ON, Crowds, and Anonymizer.com aim to provide anonymous connections that are both untraceable by “local” adversaries who control ...
Nicholas Hopper, Eugene Y. Vasserman, Eric Chan-Ti...
195
Voted
CINQ
2004
Springer
225views Database» more  CINQ 2004»
15 years 9 months ago
A Data Mining Query Language for Knowledge Discovery in a Geographical Information System
Spatial data mining is a process used to discover interesting but not explicitly available, highly usable patterns embedded in both spatial and nonspatial data, which are possibly ...
Donato Malerba, Annalisa Appice, Michelangelo Ceci
143
Voted
CSCW
2010
ACM
16 years 14 days ago
Catchup: a useful application of time-travel in meetings
People are often required to catch up on information they have missed in meetings, because of lateness or scheduling conflicts. Catching up is a complex cognitive process where pe...
Simon Tucker, Ofer Bergman, Anand Ramamoorthy, Ste...
128
Voted
IEEEHPCS
2010
15 years 2 months ago
CuHMMer: A load-balanced CPU-GPU cooperative bioinformatics application
Abstract—GPUs have recently been used to accelerate dataparallel applications for they provide easier programmability and increased generality while maintaining the tremendous me...
Ping Yao, Hong An, Mu Xu, Gu Liu, Xiaoqiang Li, Ya...