Sciweavers

2162 search results - page 293 / 433
» A Meta-Notation for Protocol Analysis
Sort
View
FC
2008
Springer
82views Cryptology» more  FC 2008»
14 years 11 months ago
Quantifying Resistance to the Sybil Attack
Sybil attacks have been shown to be unpreventable except under the protection of a vigilant central authority. We use an economic analysis to show quantitatively that some applicat...
N. Boris Margolin, Brian Neil Levine
GRAPHICSINTERFACE
2008
14 years 11 months ago
Order and entropy in picture passwords
Previous efforts involving picture-based passwords have not focused on maintaining a measurably high level of entropy. Since password systems usually allow user selection of passw...
Saranga Komanduri, Dugald Ralph Hutchings
HIS
2007
14 years 11 months ago
Genetic Programming meets Model-Driven Development
Genetic programming is known to provide good solutions for many problems like the evolution of network protocols and distributed algorithms. In such cases it is most likely a hard...
Thomas Weise, Michael Zapf, Mohammad Ullah Khan, K...
ICCE
2007
109views Education» more  ICCE 2007»
14 years 11 months ago
The Use of Learning Strategies in Learning from Text and Pictures
: Learning material in multimedia learning environments is frequently made up of text and pictures. Many students, however, have difficulties learning from such material successful...
Sabine Schlag, Mareike Florax, Rolf Plötzner
ICWN
2007
14 years 11 months ago
Dynamic Optimal Fragmentation with Rate Adaptation for Goodput Enhancement in WLANs
—To meet the demand for broadband wireless communication, wireless systems should work well in typical wireless environments, characterized by the path loss of the signals, multi...
Yusun Chang, Christopher P. Lee, Bongkyoung Kwon, ...