Sciweavers

3686 search results - page 414 / 738
» Comprehensive comprehensions
Sort
View
ACSAC
2005
IEEE
15 years 9 months ago
Graphical Passwords: A Survey
The most common computer authentication method is to use alphanumerical usernames and passwords. This method has been shown to have significant drawbacks. For example, users tend ...
Xiaoyuan Suo, Ying Zhu, G. Scott Owen
131
Voted
AUIC
2005
IEEE
15 years 9 months ago
Newly-discovered Group Awareness Mechanisms for Supporting Real-time Collaborative Authoring
Group awareness has become important in improving the usability of real-time, distributed, collaborative writing systems. However, the current set of implemented awareness mechani...
Gitesh K. Raikundalia, Hao Lan Zhang
141
Voted
BROADNETS
2005
IEEE
15 years 9 months ago
Measuring performance impact of security protocols in wireless local area networks
- In this paper, we study and quantify the impact of the most widely used security protocols, such as 802.1x, EAP, IPSEC, SSL and RADIUS, in wireless local area networks (WLANs). B...
Avesh Kumar Agarwal, Wenye Wang
CBMS
2005
IEEE
15 years 9 months ago
A Practical Tool for Visualizing and Data Mining Medical Time Series
The increasing interest in time series data mining has had surprisingly little impact on real world medical applications. Practitioners who work with time series on a daily basis ...
Li Wei, Nitin Kumar, Venkata Nishanth Lolla, Eamon...
115
Voted
COMPSAC
2005
IEEE
15 years 9 months ago
Exception Handling in Coordination-Based Mobile Environments
Mobile agent systems have many attractive features including asynchrony, openness, dynamicity and anonymity, which makes them indispensable in designing complex modern application...
Alexei Iliasov, Alexander B. Romanovsky