Sciweavers

2139 search results - page 145 / 428
» Distributed computing and computer security education
Sort
View
120
Voted
CCS
2007
ACM
15 years 9 months ago
Denial of service or denial of security?
We consider the effect attackers who disrupt anonymous communications have on the security of traditional high- and low-latency anonymous communication systems, as well as on the...
Nikita Borisov, George Danezis, Prateek Mittal, Pa...
ERCIMDL
1999
Springer
117views Education» more  ERCIMDL 1999»
15 years 7 months ago
Predicting Indexer Performance in a Distributed Digital Library
Resource discovery in a distributed digital library poses many challenges, one of which is how to choose search engines for query distribution, given a query and a set of search e...
Naomi Dushay, James C. French, Carl Lagoze
CORR
2008
Springer
94views Education» more  CORR 2008»
15 years 3 months ago
On the Weight Distribution of the Extended Quadratic Residue Code of Prime 137
The Hamming weight enumerator function of the formally self-dual even, binary extended quadratic residue code of prime p = 8m + 1 is given by Gleason's theorem for singly-eve...
Cen Tjhai, Martin Tomlinson, Marcel Ambroze, Moham...
CORR
2010
Springer
143views Education» more  CORR 2010»
15 years 3 months ago
Mathematical Foundations for a Compositional Distributional Model of Meaning
We propose a mathematical framework for a unification of the distributional theory of meaning in terms of vector space models, and a compositional theory for grammatical types, fo...
Bob Coecke, Mehrnoosh Sadrzadeh, Stephen Clark
IPPS
2007
IEEE
15 years 9 months ago
Distributed IDS using Reconfigurable Hardware
With the rapid growth of computer networks and network infrastructures and increased dependency on the internet to carry out day-to-day activities, it is imperative that the compo...
Ashok Kumar Tummala, Parimal Patel