Sciweavers

3544 search results - page 178 / 709
» Online Computation with Advice
Sort
View
ACNS
2005
Springer
88views Cryptology» more  ACNS 2005»
15 years 6 months ago
Strengthening Password-Based Authentication Protocols Against Online Dictionary Attacks
Passwords are one of the most common cause of system break-ins, because the low entropy of passwords makes systems vulnerable to brute force guessing attacks (dictionary attacks). ...
Peng Wang, Yongdae Kim, Vishal Kher, Taekyoung Kwo...
87
Voted
APPROX
2010
Springer
137views Algorithms» more  APPROX 2010»
15 years 2 months ago
Online Embeddings
We initiate the study of on-line metric embeddings. In such an embedding we are given a sequence of n points X = x1, . . . , xn one by one, from a metric space M = (X, D). Our goal...
Piotr Indyk, Avner Magen, Anastasios Sidiropoulos,...
ICMCS
2006
IEEE
161views Multimedia» more  ICMCS 2006»
15 years 6 months ago
Improved Similarity-Based Online Feature Selection in Region-Based Image Retrieval
To bridge the gap between high level semantic concepts and low level visual features in content-based image retrieval (CBIR), online feature selection is really required. An effec...
Fei Li, Qionghai Dai, Wenli Xu
94
Voted
NETGAMES
2005
ACM
15 years 6 months ago
Patch scheduling for on-line games
One of the challenges facing the on-line gaming community is the delivery of new content to players. While the initial distribution of a game is typically done via large media for...
Chris Chambers, Wu-chang Feng
NPC
2004
Springer
15 years 6 months ago
Online Mining in Sensor Networks
Online mining in large sensor networks just starts to attract interest. Finding patterns in such an environment is both compelling and challenging. The goal of this position paper ...
Xiuli Ma, Dongqing Yang, Shiwei Tang, Qiong Luo, D...