Sciweavers

4719 search results - page 144 / 944
» Applications = Components GLoo
Sort
View
CORR
2011
Springer
167views Education» more  CORR 2011»
14 years 7 months ago
The weak password problem: chaos, criticality, and encrypted p-CAPTCHAs
- Vulnerabilities related to weak passwords are a pressing global economic and security issue. We report a novel, simple, and effective approach to address the weak password probl...
T. V. Laptyeva, S. Flach, K. Kladko
CORR
2012
Springer
209views Education» more  CORR 2012»
13 years 11 months ago
Densest Subgraph in Streaming and MapReduce
The problem of finding locally dense components of a graph is an important primitive in data analysis, with wide-ranging applications from community mining to spam detection and ...
Bahman Bahmani, Ravi Kumar, Sergei Vassilvitskii
WWW
2007
ACM
16 years 4 months ago
XML-based XML schema access
ma's abstract data model consists of components, which are the structures that eventually define a schema as a whole. XML Schema's XML syntax, on the other hand, is not ...
Erik Wilde, Felix Michel
ICSM
2003
IEEE
15 years 9 months ago
Towards a Versioning Model for Component-based Software Assembly
The world of software development has rapidly changed in the last few years due to the adoption of component-based technologies. The classical software configuration management, ...
Jaroslav Gergic
TOH
2010
97views more  TOH 2010»
15 years 2 months ago
A Frequency-Domain Analysis of Haptic Gratings
—The detectability and discriminability of virtual haptic gratings were analyzed in the frequency domain. Detection (Exp. 1) and discrimination (Exp. 2) thresholds for virtual ha...
Steven A. Cholewiak, Kwangtaek Kim, Hong Z. Tan, B...