Sciweavers

536 search results - page 55 / 108
» paste 2010
Sort
View
ACISP
2010
Springer
13 years 10 months ago
One-Time-Password-Authenticated Key Exchange
To reduce the damage of phishing and spyware attacks, banks, governments, and other security-sensitive industries are deploying one-time password systems, where users have many pa...
Kenneth G. Paterson, Douglas Stebila
ACRI
2010
Springer
13 years 10 months ago
Network Decontamination with Temporal Immunity by Cellular Automata
Abstract. Network decontamination (or disinfection) is a widely studied problem in distributed computing. Network sites are assumed to be contaminated (e.g., by a virus) and a team...
Yassine Daadaa, Paola Flocchini, Nejib Zaguia
AAAI
2010
13 years 10 months ago
Understanding the Success of Perfect Information Monte Carlo Sampling in Game Tree Search
Perfect Information Monte Carlo (PIMC) search is a practical technique for playing imperfect information games that are too large to be optimally solved. Although PIMC search has ...
Jeffrey Richard Long, Nathan R. Sturtevant, Michae...
ADHOCNOW
2010
Springer
13 years 10 months ago
Coverage-Adaptive Random Walks for Fast Sensory Data Collection
Random walks in wireless sensor networks can serve as fully local, very simple strategies for sink motion that reduce energy dissipation a lot but increase the latency of data coll...
Constantinos Marios Angelopoulos, Sotiris E. Nikol...
ECIR
2010
Springer
13 years 10 months ago
A Performance Prediction Approach to Enhance Collaborative Filtering Performance
Performance prediction has gained increasing attention in the IR field since the half of the past decade and has become an established research topic in the field. The present work...
Alejandro Bellogín, Pablo Castells