Sciweavers

622 search results - page 37 / 125
» Fast Computation of Large Distributions and Its Cryptographi...
Sort
View
SASN
2003
ACM
15 years 5 months ago
Admission control in Peer-to-Peer: design and performance evaluation
Peer-to-Peer (P2P) applications and services are very common in today’s computing. The popularity of the P2P paradigm prompts the need for specialized security services which ma...
Nitesh Saxena, Gene Tsudik, Jeong Hyun Yi
UIST
2010
ACM
14 years 9 months ago
Gesture search: a tool for fast mobile data access
Modern mobile phones can store a large amount of data, such as contacts, applications and music. However, it is difficult to access specific data items via existing mobile user in...
Yang Li
CCS
2005
ACM
15 years 5 months ago
Fast dictionary attacks on passwords using time-space tradeoff
Human-memorable passwords are a mainstay of computer security. To decrease vulnerability of passwords to bruteforce dictionary attacks, many organizations enforce complicated pass...
Arvind Narayanan, Vitaly Shmatikov
BMCBI
2010
146views more  BMCBI 2010»
14 years 12 months ago
Genomic selection and complex trait prediction using a fast EM algorithm applied to genome-wide markers
Background: The information provided by dense genome-wide markers using high throughput technology is of considerable potential in human disease studies and livestock breeding pro...
Ross K. Shepherd, Theo H. E. Meuwissen, John A. Wo...
ICRA
2006
IEEE
94views Robotics» more  ICRA 2006»
15 years 5 months ago
Totally Distributed Motion Control of Sphere World Multi-agent Systems using Decentralized Navigation Functions
— A distributed feedback control architecture that guarantees collision avoidance and destination convergence for multiple sphere world holonomic agents is presented. The well es...
Dimos V. Dimarogonas, Kostas J. Kyriakopoulos, Dim...