Sciweavers

2237 search results - page 356 / 448
» On the Security of Random Sources
Sort
View
APSEC
2005
IEEE
14 years 12 months ago
Increasing the Efficiency of Fault Detection in Modified Code
Many software systems are developed in a number of consecutive releases. Each new release does not only add new code but also modifies already existing one. In this study we have ...
Piotr Tomaszewski, Lars Lundberg, Håkan Grah...
BIOCOMP
2007
14 years 11 months ago
Quality-Based Similarity Search for Biological Sequence Databases
Low-Complexity Regions (LCRs) of biological sequences are the main source of false positives in similarity searches for biological sequence databases. We consider the problem of ï...
Xuehui Li, Tamer Kahveci
GRAPHICSINTERFACE
2008
14 years 11 months ago
Order and entropy in picture passwords
Previous efforts involving picture-based passwords have not focused on maintaining a measurably high level of entropy. Since password systems usually allow user selection of passw...
Saranga Komanduri, Dugald Ralph Hutchings
NETWORKING
2007
14 years 11 months ago
On-Demand Routing in Disrupted Environments
While current on-demand routing protocols are optimized to take into account unique features of mobile ad hoc networks (MANETs) such as frequent topology changes and limited batter...
Jay Boice, J. J. Garcia-Luna-Aceves, Katia Obraczk...
81
Voted
RIAO
2007
14 years 11 months ago
Discriminative Fields for Modeling Semantic Concepts in Video
According to some current thinking, a very large number of semantic concepts could provide researcher a novel way to characterize video and be utilized for video retrieval and und...
Ming-yu Chen, Alexander G. Hauptmann