Sciweavers

CORR
2011
Springer
167views Education» more  CORR 2011»
12 years 11 months ago
The weak password problem: chaos, criticality, and encrypted p-CAPTCHAs
- Vulnerabilities related to weak passwords are a pressing global economic and security issue. We report a novel, simple, and effective approach to address the weak password probl...
T. V. Laptyeva, S. Flach, K. Kladko
CORR
2011
Springer
121views Education» more  CORR 2011»
12 years 11 months ago
Colorful Triangle Counting and a MapReduce Implementation
Rasmus Pagh, Charalampos E. Tsourakakis
CORR
2011
Springer
175views Education» more  CORR 2011»
12 years 11 months ago
Heuristic Algorithm for Interpretation of Non-Atomic Categorical Attributes in Similarity-based Fuzzy Databases - Scalability Ev
- In this work we are analyzing scalability of the heuristic algorithm we used in the past [1-4] to discover knowledge from multi-valued symbolic attributes in fuzzy databases. The...
M. Shahriar Hossain, Rafal A. Angryk
CORR
2011
Springer
188views Education» more  CORR 2011»
12 years 11 months ago
Image Encryption Using Differential Evolution Approach in Frequency Domain
Maaly Awad S. Hassan, Ibrahim Soliman I Abuhaiba
CORR
2011
Springer
146views Education» more  CORR 2011»
12 years 11 months ago
Use of Devolved Controllers in Data Center Networks
—In a data center network, for example, it is quite often to use controllers to manage resources in a centralized manner. Centralized control, however, imposes a scalability prob...
Adrian Sai-Wah Tam, Kang Xi, H. Jonathan Chao
CORR
2011
Springer
171views Education» more  CORR 2011»
12 years 11 months ago
Orthogonal Range Searching on the RAM, Revisited
We present a number of new results on one of the most extensively studied topics in computational geometry, orthogonal range searching. All our results are in the standard word RA...
Timothy M. Chan, Kasper Green Larsen, Mihai Patras...
CORR
2011
Springer
211views Education» more  CORR 2011»
12 years 11 months ago
Programming Massively Parallel Architectures using MARTE: a Case Study
—Nowadays, several industrial applications are being ported to parallel architectures. These applications take advantage of the potential parallelism provided by multiple core pr...
Antonio Wendell De Oliveira Rodrigues, Fréd...
CORR
2011
Springer
161views Education» more  CORR 2011»
12 years 11 months ago
Doubly Robust Policy Evaluation and Learning
We study decision making in environments where the reward is only partially observed, but can be modeled as a function of an action and an observed context. This setting, known as...
Miroslav Dudík, John Langford, Lihong Li