Sciweavers

790 search results - page 158 / 158
» Designated Confirmer Signatures
Sort
View
BMCBI
2010
163views more  BMCBI 2010»
12 years 11 months ago
RISCI - Repeat Induced Sequence Changes Identifier: a comprehensive, comparative genomics-based, in silico subtractive hybridiza
Background -: The availability of multiple whole genome sequences has facilitated in silico identification of fixed and polymorphic transposable elements (TE). Whereas polymorphic...
Vipin Singh, Rakesh K. Mishra
TCIAIG
2010
12 years 11 months ago
Game Bot Detection via Avatar Trajectory Analysis
The objective of this work is to automatically detect the use of game bots in online games based on the trajectories of account users. Online gaming has become one of the most popu...
Hsing-Kuo Pao, Kuan-Ta Chen, Hong-Chung Chang
JSAC
2007
116views more  JSAC 2007»
13 years 4 months ago
GroCoca: group-based peer-to-peer cooperative caching in mobile environment
— In a mobile cooperative caching environment, we observe the need for cooperating peers to cache useful data items together, so as to improve cache hit from peers. This could be...
Chi-Yin Chow, Hong Va Leong, Alvin T. S. Chan
IACR
2011
221views more  IACR 2011»
12 years 4 months ago
A Novel RFID Distance Bounding Protocol Based on Physically Unclonable Functions
Abstract. Radio Frequency Identification (RFID) systems are vulnerable to relay attacks (i.e., mafia, terrorist and distance frauds) when they are used for authentication purpose...
Süleyman Kardas, Mehmet Sabir Kiraz, Muhammed...
ASPLOS
2012
ACM
12 years 11 days ago
DejaVu: accelerating resource allocation in virtualized environments
Effective resource management of virtualized environments is a challenging task. State-of-the-art management systems either rely on analytical models or evaluate resource allocati...
Nedeljko Vasic, Dejan M. Novakovic, Svetozar Miuci...