Sciweavers

608 search results - page 45 / 122
» Random Systems with Complete Connections
Sort
View
WSC
1997
14 years 11 months ago
A Sortation System Model
Automotive manufacturing is a complex task involving several steps of machining and assembly. Typically, larger components of an automobile such as the body, engine etc. are assem...
Arun Jayaraman, Ramu Narayanaswamy, Ali K. Gunal
USENIX
2007
15 years 5 days ago
Passwords for Everyone: Secure Mnemonic-based Accessible Authentication
In many environments, a computer system is severely constrained to the extent that the practical input mechanisms are merely binary switches. Requiring the user to remember a long...
Umut Topkara, Mercan Topkara, Mikhail J. Atallah
ICPADS
2006
IEEE
15 years 3 months ago
XYZ: A Scalable, Partially Centralized Lookup Service for Large-Scale Peer-to-Peer Systems
Peer-to-Peer (P2P) systems are characterized by direct access between peer computers, rather than through a centralized server. File sharing is the dominant P2P application on the...
Jianying Zhang, Jie Wu
RAID
1999
Springer
15 years 2 months ago
Mobile Agent Attack Resistant Distributed Hierarchical Intrusion Detection Systems
Distributed intrusion detection systems are especially vulnerable to attacks because the components reside at a static location and are connected together into a hierarchical stru...
Peter Mell, Mark McLarnon
CARDIS
2010
Springer
159views Hardware» more  CARDIS 2010»
15 years 1 months ago
Modeling Privacy for Off-Line RFID Systems
This paper establishes a novel model for RFID schemes where readers are not continuously connected to the back office, but only periodically. Furthermore, adversaries are not only ...
Flavio D. Garcia, Peter van Rossum