Sciweavers

1560 search results - page 256 / 312
» Broadcasting with Side Information
Sort
View
CCS
2007
ACM
15 years 5 months ago
Beamauth: two-factor web authentication with a bookmark
We propose BeamAuth, a two-factor web authentication technique where the second factor is a specially crafted bookmark. BeamAuth presents two interesting features: (1) only server...
Ben Adida
CEAS
2007
Springer
15 years 5 months ago
DomainKeys Identified Mail (DKIM): Using Digital Signatures for Domain Verification
Email protocols were designed to be flexible and forgiving, designed in a day when Internet usage was a cooperative thing. A side effect of that is that they were not designed to ...
Barry Leiba, Jim Fenton
CIKM
2007
Springer
15 years 5 months ago
Towards practically feasible answering of regular path queries in lav data integration
Regular path queries (RPQ’s) are given by means of regular expressions and ask for matching patterns on labeled graphs. RPQ’s have received great attention in the context of s...
Manuel Tamashiro, Alex Thomo, Srinivasan Venkatesh
GECCO
2007
Springer
191views Optimization» more  GECCO 2007»
15 years 5 months ago
Particle swarm guided evolution strategy
Evolution strategy (ES) and particle swarm optimization (PSO) are two of the most popular research topics for tackling real-parameter optimization problems in evolutionary computa...
Chang-Tai Hsieh, Chih-Ming Chen, Ying-Ping Chen
IDEAS
2006
IEEE
152views Database» more  IDEAS 2006»
15 years 5 months ago
Querying Encrypted XML Documents
This paper proposes techniques to query encrypted XML documents. Such a problem predominantly occurs in “Database as a Service” (DAS) architectures, where a client may outsour...
Ravi Chandra Jammalamadaka, Sharad Mehrotra