Sciweavers

1186 search results - page 134 / 238
» A New Approach to Secure Logging
Sort
View
103
Voted
IBPRIA
2003
Springer
15 years 6 months ago
A User Authentication Technic Using a~Web Interaction Monitoring System
User authentication based on biometrics has explored both physiological and behavioral characteristics. We present a system, called Web Interaction Display and Monitoring (WIDAM), ...
Hugo Gamboa, Ana L. N. Fred
145
Voted
STOC
1991
ACM
167views Algorithms» more  STOC 1991»
15 years 4 months ago
Counting Networks and Multi-Processor Coordination
d Abstract) James Aspnes Maurice Herlihyy Nir Shavitz Digital Equipment Corporation Cambridge Research Lab CRL 90/11 September 18, 1991 Many fundamental multi-processor coordinati...
James Aspnes, Maurice Herlihy, Nir Shavit
79
Voted
CORR
2008
Springer
98views Education» more  CORR 2008»
15 years 25 days ago
Picking up the Pieces: Self-Healing in Reconfigurable Networks
We consider the problem of self-healing in networks that are reconfigurable in the sense that they can change their topology during an attack. Our goal is to maintain connectivity...
Jared Saia, Amitabh Trehan
101
Voted
TCOM
2010
133views more  TCOM 2010»
14 years 7 months ago
Low-complexity decoding for non-binary LDPC codes in high order fields
In this paper, we propose a new implementation of the Extended Min-Sum (EMS) decoder for non-binary LDPC codes. A particularity of the new algorithm is that it takes into accounts...
Adrian Voicila, David Declercq, François Ve...
SIGSOFT
2010
ACM
14 years 10 months ago
Multiplicity computing: a vision of software engineering for next-generation computing platform applications
New technologies have recently emerged to challenge the very nature of computing: multicore processors, virtualized operating systems and networks, and data-center clouds. One can...
Cristian Cadar, Peter Pietzuch, Alexander L. Wolf