Sciweavers

2995 search results - page 322 / 599
» On multi-avoidance of generalized patterns
Sort
View
142
Voted
CORR
2011
Springer
173views Education» more  CORR 2011»
14 years 7 months ago
Psi-calculi: a framework for mobile processes with nominal data and logic
The framework of psi-calculi extends the pi-calculus with nominal datatypes for data structures and for logical assertions and conditions. These can be transmitted between processe...
Jesper Bengtson, Magnus Johansson, Joachim Parrow,...
89
Voted
HOTNETS
2010
14 years 7 months ago
How to tell an airport from a home: techniques and applications
Today's Internet services increasingly use IP-based geolocation to specialize the content and service provisioning for each user. However, these systems focus almost exclusiv...
Andreas Pitsillidis, Yinglian Xie, Fang Yu, Mart&i...
91
Voted
CSCW
2012
ACM
13 years 8 months ago
Community-based web security: complementary roles of the serious and casual contributors
Does crowdsourcing work for web security? While the herculean task of evaluating hundreds of millions of websites can certainly benefit from the wisdom of crowds, skeptics questi...
Pern Hui Chia, John Chuang
122
Voted
MMSYS
2012
242views more  MMSYS 2012»
13 years 8 months ago
6DMG: a new 6D motion gesture database
Motion-based control is gaining popularity, and motion gestures form a complementary modality in human-computer interactions. To achieve more robust user-independent motion gestur...
Mingyu Chen, Ghassan Al-Regib, Biing-Hwang Juang
CRYPTO
2005
Springer
110views Cryptology» more  CRYPTO 2005»
15 years 6 months ago
The Conditional Correlation Attack: A Practical Attack on Bluetooth Encryption
Motivated by the security of the nonlinear filter generator, the concept of correlation was previously extended to the conditional correlation, that studied the linear correlation...
Yi Lu 0002, Willi Meier, Serge Vaudenay