Sciweavers

502 search results - page 32 / 101
» Deploying a New Hash Algorithm
Sort
View
IJSWIS
2008
135views more  IJSWIS 2008»
14 years 11 months ago
Efficient Processing of RDF Queries with Nested Optional Graph Patterns in an RDBMS
Relational technology has shown to be very useful for scalable Semantic Web data management. Numerous researchers have proposed to use RDBMSs to store and query voluminous RDF dat...
Artem Chebotko, Shiyong Lu, Mustafa Atay, Farshad ...
INFOCOM
2009
IEEE
15 years 6 months ago
Trap Coverage: Allowing Coverage Holes of Bounded Diameter in Wireless Sensor Networks
—Tracking of movements such as that of people, animals, vehicles, or of phenomena such as fire, can be achieved by deploying a wireless sensor network. So far only prototype sys...
Paul Balister, Zizhan Zheng, Santosh Kumar, Prasun...
PE
2000
Springer
118views Optimization» more  PE 2000»
14 years 11 months ago
A probabilistic dynamic technique for the distributed generation of very large state spaces
Conventional methods for state space exploration are limited to the analysis of small systems because they suffer from excessive memory and computational requirements. We have dev...
William J. Knottenbelt, Peter G. Harrison, Mark Me...
HICSS
2009
IEEE
101views Biometrics» more  HICSS 2009»
15 years 6 months ago
Building a Better Similarity Trap with Statistically Improbable Features
One of the persistent topics in digital forensic research in recent years has been the problem of finding all things similar. Developed tools usually take on the form of similarit...
Vassil Roussev
CTRSA
2007
Springer
110views Cryptology» more  CTRSA 2007»
15 years 6 months ago
Selecting Secure Passwords
We mathematically explore a model for the shortness and security for passwords that are stored in hashed form. The model is implicitly in the NIST publication [8] and is based on c...
Eric R. Verheul