Sciweavers

19985 search results - page 3905 / 3997
» Modelling Ecological Data
Sort
View
SIGIR
2005
ACM
15 years 8 months ago
Server selection methods in hybrid portal search
The TREC .GOV collection makes a valuable web testbed for distributed information retrieval methods because it is naturally partitioned and includes 725 web-oriented queries with ...
David Hawking, Paul Thomas
VRST
2005
ACM
15 years 8 months ago
A 2D-3D integrated environment for cooperative work
This paper proposes a novel tabletop display system for natural communication and flexible information sharing. The proposed system is specifically designed for integration of 2...
Kousuke Nakashima, Takashi Machida, Kiyoshi Kiyoka...
CAV
2005
Springer
150views Hardware» more  CAV 2005»
15 years 8 months ago
Reasoning About Threads Communicating via Locks
Abstract. We propose a new technique for the static analysis of concurrent programs comprised of multiple threads. In general, the problem is known to be undecidable even for progr...
Vineet Kahlon, Franjo Ivancic, Aarti Gupta
CCS
2005
ACM
15 years 8 months ago
On deriving unknown vulnerabilities from zero-day polymorphic and metamorphic worm exploits
Vulnerabilities that allow worms to hijack the control flow of each host that they spread to are typically discovered months before the worm outbreak, but are also typically disc...
Jedidiah R. Crandall, Zhendong Su, Shyhtsun Felix ...
CCS
2005
ACM
15 years 8 months ago
Fast dictionary attacks on passwords using time-space tradeoff
Human-memorable passwords are a mainstay of computer security. To decrease vulnerability of passwords to bruteforce dictionary attacks, many organizations enforce complicated pass...
Arvind Narayanan, Vitaly Shmatikov
« Prev « First page 3905 / 3997 Last » Next »