Sciweavers

389 search results - page 47 / 78
» Computational Alternatives to Random Number Generators
Sort
View
153
Voted
INFORMATICALT
2010
132views more  INFORMATICALT 2010»
15 years 1 months ago
An Improved Securer and Efficient Nonce-Based Authentication Scheme with Token-Update
In this paper, we propose a mutual authentication scheme using nonce variable instead of Mac address and accompanying with token updates to improve the functionality. Lee et al. (2...
Chiu-Hsiung Liao, Ching-Te Wang, Hon-Chan Chen
ICMCS
1996
IEEE
72views Multimedia» more  ICMCS 1996»
15 years 8 months ago
A Probabilistic Multi-cycle Model for Serving Continuous Streams from Disks
Existing models for serving continuous streams from disks are generally based on worst-case deterministic head displacement times and on a round-robin strand service approach cons...
Freddy Deppner, Benoit A. Gennart, Roger D. Hersch
CEC
2007
IEEE
15 years 10 months ago
A fractal representation for real optimization
— The chaos game, in which a moving point is repeatedly averaged toward randomly selected vertices of a triangle, is one method of generating the fractal called the Sierpinski tr...
Daniel A. Ashlock, Justin Schonfeld
130
Voted
VLDB
2007
ACM
119views Database» more  VLDB 2007»
15 years 10 months ago
Integrity Auditing of Outsourced Data
An increasing number of enterprises outsource their IT services to third parties who can offer these services for a much lower cost due to economy of scale. Quality of service is ...
Min Xie, Haixun Wang, Jian Yin, Xiaofeng Meng
144
Voted
NDSS
2008
IEEE
15 years 10 months ago
Automated Whitebox Fuzz Testing
Fuzz testing is an effective technique for finding security vulnerabilities in software. Traditionally, fuzz testing tools apply random mutations to well-formed inputs of a progr...
Patrice Godefroid, Michael Y. Levin, David A. Moln...