Sciweavers

610 search results - page 42 / 122
» Generating Research Websites Using Summarisation Techniques
Sort
View
WWW
2005
ACM
15 years 10 months ago
A convenient method for securely managing passwords
Computer users are asked to generate, keep secret, and recall an increasing number of passwords for uses including host accounts, email servers, e-commerce sites, and online finan...
J. Alex Halderman, Brent Waters, Edward W. Felten
TISSEC
2010
237views more  TISSEC 2010»
14 years 4 months ago
BLAC: Revoking Repeatedly Misbehaving Anonymous Users without Relying on TTPs
Several credential systems have been proposed in which users can authenticate to service providers anonymously. Since anonymity can give users the license to misbehave, some varia...
Patrick P. Tsang, Man Ho Au, Apu Kapadia, Sean W. ...
IV
2007
IEEE
149views Visualization» more  IV 2007»
15 years 4 months ago
Information Visualization of Multi-dimensional Cellular Automata using GPU Programming
We propose a method for generating all possible rules of multidimension Boolean cellular automata (CA). Based on an original encoding method and the programming of graphical proce...
Stéphane Gobron, Daniel Mestre
SIGADA
1999
Springer
15 years 2 months ago
Towards a distributed object-oriented propagation model using Ada95
Representing interdependencies between the objects of an object-oriented software application requires designtime mechanisms for specifying object interrelationships, as well as s...
Donald M. Needham, Steven A. Demurjian, Thomas J. ...
INCDM
2010
Springer
172views Data Mining» more  INCDM 2010»
14 years 8 months ago
Evaluating the Quality of Clustering Algorithms Using Cluster Path Lengths
Many real world systems can be modeled as networks or graphs. Clustering algorithms that help us to organize and understand these networks are usually referred to as, graph based c...
Faraz Zaidi, Daniel Archambault, Guy Melanç...