Sciweavers

733 search results - page 130 / 147
» Recommending random walks
Sort
View
ISW
2009
Springer
15 years 4 months ago
Nonce Generators and the Nonce Reset Problem
A nonce is a cryptographic input value which must never repeat within a given context. Nonces are important for the security of many cryptographic building blocks, such as stream c...
Erik Zenner
DSN
2005
IEEE
15 years 3 months ago
Coverage and the Use of Cyclic Redundancy Codes in Ultra-Dependable Systems
A Cyclic Redundancy Code (CRC), when used properly, can be an effective and relatively inexpensive method to detect data corruption across communication channels. However, some sy...
Michael Paulitsch, Jennifer Morris, Brendan Hall, ...
91
Voted
LCN
2005
IEEE
15 years 3 months ago
On the Server Fairness of Congestion Control in the ISP Edge Router
The Internet Engineering Task Force (IETF) recommended the deployment of Active Queue Management (AQM) in the Internet routers in 1998. There were more than 50 new AQM algorithms ...
Hsien-Ming Wu, Chin-Chi Wu, Woei Lin
SIGECOM
2003
ACM
107views ECommerce» more  SIGECOM 2003»
15 years 2 months ago
Using value queries in combinatorial auctions
Combinatorial auctions, where bidders can bid on bundles of items are known to be desirable auction mechanisms for selling items that are complementary and/or substitutable. Howev...
Benoît Hudson, Tuomas Sandholm
WEA
2010
Springer
316views Algorithms» more  WEA 2010»
15 years 2 months ago
Modularity-Driven Clustering of Dynamic Graphs
Maximizing the quality index modularity has become one of the primary methods for identifying the clustering structure within a graph. As contemporary networks are not static but e...
Robert Görke, Pascal Maillard, Christian Stau...