Sciweavers

753 search results - page 105 / 151
» Completing a (k - 1)-Assignment
Sort
View
DIM
2008
ACM
14 years 11 months ago
Quantifying the security of preference-based authentication
We describe a technique aimed at addressing longstanding problems for password reset: security and cost. In our approach, users are authenticated using their preferences. Experime...
Markus Jakobsson, Liu Yang, Susanne Wetzel
LREC
2008
106views Education» more  LREC 2008»
14 years 11 months ago
A Corpus for Cross-Document Co-reference
This paper describes a newly created text corpus of news articles that has been annotated for cross-document co-reference. Being able to robustly resolve references to entities ac...
David Day, Janet Hitzeman, Michael L. Wick, Keith ...
MASCOTS
2007
14 years 11 months ago
Performance Analysis of Wireless MAC Protocols Using a Search Based Framework
—Previously, we have developed a framework to perform systematic analysis of CSMA/CA based wireless MAC protocols. The framework first identifies protocol states that meet our ...
Shamim Begum, Sandeep K. S. Gupta, Ahmed Helmy
ISCAPDCS
2001
14 years 11 months ago
Comparison of Various TCP Implementations in a Congested Network
Transmission Control Protocol (TCP) in the Internet Protocol suite has become over the years the most widely used protocol for data communications. Recent developments in high-spe...
Mansoor Alam, Shravan K. Vallala, Min Song
WSC
2001
14 years 11 months ago
Supply chain agent decision aid system (SCADAS)
Supply chain decisions are improved with access to global information. However, supply chain partners are frequently hesitant to provide full access to all the information within ...
Anurag Gupta, Larry Whitman, Ramesh K. Agarwal