Sciweavers

1403 search results - page 281 / 281
» On Communication in Solving Distributed Constraint Satisfact...
Sort
View
ECRIME
2007
13 years 9 months ago
Evaluating a trial deployment of password re-use for phishing prevention
We propose a scheme that exploits scale to prevent phishing. We show that while stopping phishers from obtaining passwords is very hard, detecting the fact that a password has bee...
Dinei A. F. Florêncio, Cormac Herley
SIGKDD
2008
125views more  SIGKDD 2008»
13 years 5 months ago
Incremental pattern discovery on streams, graphs and tensors
Incremental pattern discovery targets streaming applications where the data continuously arrive incrementally. The questions are how to find patterns (main trends) incrementally; ...
Jimeng Sun
SIGMETRICS
2008
ACM
150views Hardware» more  SIGMETRICS 2008»
13 years 5 months ago
Performance of random medium access control, an asymptotic approach
Random Medium-Access-Control (MAC) algorithms have played an increasingly important role in the development of wired and wireless Local Area Networks (LANs) and yet the performanc...
Charles Bordenave, David McDonald, Alexandre Prout...