Sciweavers

1297 search results - page 227 / 260
» Large Model Visualization: Techniques and Applications
Sort
View
CCS
2005
ACM
15 years 5 months ago
Fast dictionary attacks on passwords using time-space tradeoff
Human-memorable passwords are a mainstay of computer security. To decrease vulnerability of passwords to bruteforce dictionary attacks, many organizations enforce complicated pass...
Arvind Narayanan, Vitaly Shmatikov
SSDBM
2005
IEEE
111views Database» more  SSDBM 2005»
15 years 5 months ago
Querying Streaming Geospatial Image Data: The GeoStreams Project
Data products generated from remotely-sensed, geospatial imagery (RSI) used in emerging areas, such as global climatology, environmental monitoring, land use, and disaster managem...
Quinn Hart, Michael Gertz
AGENTS
2000
Springer
15 years 4 months ago
Automated assistants to aid humans in understanding team behaviors
Multi-agent teamwork is critical in a large number of agent applications, including training, education, virtual enterprises and collective robotics. Tools that can help humans an...
Taylor Raines, Milind Tambe, Stacy Marsella
MTV
2005
IEEE
100views Hardware» more  MTV 2005»
15 years 5 months ago
A Study of Architecture Description Languages from a Model-based Perspective
Abstract— Owing to the recent trend of using applicationspecific instruction-set processors (ASIP), many Architecture Description Languages (ADLs) have been created. They specif...
Wei Qin, Sharad Malik
ISDA
2010
IEEE
14 years 9 months ago
Avoiding simplification strategies by introducing multi-objectiveness in real world problems
Abstract--In business analysis, models are sometimes oversimplified. We pragmatically approach many problems with a single financial objective and include monetary values for non-m...
Charlotte J. C. Rietveld, Gijs P. Hendrix, Frank T...