Sciweavers

8795 search results - page 1533 / 1759
» Measuring Generality of Documents
Sort
View
136
Voted
IMC
2007
ACM
15 years 6 months ago
Cryptographic strength of ssl/tls servers: current and recent practices
The Secure Socket Layer (SSL) and its variant, Transport Layer Security (TLS), are used toward ensuring server security. In this paper, we characterize the cryptographic strength ...
Homin K. Lee, Tal Malkin, Erich M. Nahum
158
Voted
BCSHCI
2007
15 years 6 months ago
Usability of user interfaces: from monomodal to multimodal
This workshop is aimed at reviewing and comparing existing Usability Evaluation Methods (UEMs) which are applicable to monomodal and multimodal applications, whether they are web-...
Silvia Abrahão, Jean Vanderdonckt
161
Voted
MASCOTS
2008
15 years 6 months ago
Tackling the Memory Balancing Problem for Large-Scale Network Simulation
A key obstacle to large-scale network simulation over PC clusters is the memory balancing problem where a memory-overloaded machine can slow down an entire simulation due to disk ...
Hyojeong Kim, Kihong Park
SIMUTOOLS
2008
15 years 6 months ago
Simulation of ad hoc networks: ns-2 compared to JiST/SWANS
For the evaluation of ad hoc network protocols, researchers traditionally use simulations because they easily allow for a large number of nodes and reproducible environment condit...
Elmar Schoch, Michael Feiri, Frank Kargl, Michael ...
SODA
2003
ACM
114views Algorithms» more  SODA 2003»
15 years 6 months ago
Lower bounds for collusion-secure fingerprinting
Collusion-secure fingerprinting codes are an important primitive used by many digital watermarking schemes [1, 10, 9]. Boneh and Shaw [3] define a model for these types of codes...
Chris Peikert, Abhi Shelat, Adam Smith
« Prev « First page 1533 / 1759 Last » Next »