Sciweavers

84 search results - page 16 / 17
» Directed Transitive Signature Scheme
Sort
View
ICNP
2006
IEEE
13 years 11 months ago
On the Practical and Security Issues of Batch Content Distribution Via Network Coding
— File distribution via network coding has received a lot of attention lately. However, direct application of network coding may have security problems. In particular, attackers ...
Qiming Li, Dah-Ming Chiu, John C. S. Lui
TCIAIG
2010
13 years 6 days ago
Game Bot Detection via Avatar Trajectory Analysis
The objective of this work is to automatically detect the use of game bots in online games based on the trajectories of account users. Online gaming has become one of the most popu...
Hsing-Kuo Pao, Kuan-Ta Chen, Hong-Chung Chang
ECIR
2009
Springer
14 years 2 months ago
Correlation of Term Count and Document Frequency for Google N-Grams
For bounded datasets such as the TREC Web Track (WT10g) the computation of term frequency (TF) and inverse document frequency (IDF) is not difficult. However, when the corpus is th...
Martin Klein, Michael L. Nelson
CORR
2011
Springer
198views Education» more  CORR 2011»
13 years 15 days ago
Quire: Lightweight Provenance for Smart Phone Operating Systems
Smartphone apps often run with full privileges to access the network and sensitive local resources, making it difficult for remote systems to have any trust in the provenance of ...
Michael Dietz, Shashi Shekhar, Yuliy Pisetsky, Anh...
IJRR
2006
123views more  IJRR 2006»
13 years 5 months ago
Hybrid Control of the Berkeley Lower Extremity Exoskeleton (BLEEX)
The first functional load-carrying and energetically autonomous exoskeleton was demonstrated at U.C. Berkeley, walking at the average speed of 0.9 m/s (2 mph) while carrying a 34 ...
Hami Kazerooni, Ryan Steger, Lihua Huang