Sciweavers

8810 search results - page 35 / 1762
» Open. Closed. Open
Sort
View
ACSAC
2005
IEEE
15 years 10 months ago
Improved Port Knocking with Strong Authentication
It is sometimes desirable to allow access to open ports on a firewall only to authorized external users and present closed ports to all others. We examine ways to construct an au...
Rennie deGraaf, John Aycock, Michael J. Jacobson J...
FOCS
2004
IEEE
15 years 8 months ago
Learning with Errors in Answers to Membership Queries
We study the learning models defined in [AKST97]: Learning with equivalence and limited membership queries and learning with equivalence and malicious membership queries. We show ...
Laurence Bisht, Nader H. Bshouty, Lawrance Khoury
HICSS
2007
IEEE
130views Biometrics» more  HICSS 2007»
15 years 10 months ago
Analysis of Activity in the Open Source Software Development Community
— Open Source Software is computer software for which the source code is publicly open for inspection, modification, and redistribution. While research of a few, large, successf...
Scott Christley, Gregory R. Madey
ELPUB
2007
ACM
15 years 8 months ago
Five Years on - The Impact of the Budapest Open Access Initiative
Open Access was first defined by the Budapest Open Access Initiative following a meeting organized by the Open Society Institute/Soros foundations. The subsequent Open Access move...
Melissa R. Hagemann
CONCUR
2000
Springer
15 years 8 months ago
Chi Calculus with Mismatch
The theory of chi processes with the mismatch operator is studied. Two open congruence relations are investigated. These are weak early open congruence and weak late open congruenc...
Yuxi Fu, Zhenrong Yang