Sciweavers

3210 search results - page 53 / 642
» Secure Similarity Search
Sort
View
ICCBR
2001
Springer
15 years 4 months ago
An Accurate Adaptation-Guided Similarity Metric for Case-Based Planning
In this paper, we present an adaptation-guided similarity metric based on the estimate of the number of actions between states, called ADG (Action Distance-Guided). It is determine...
Flavio Tonidandel, Marcio Rillo
CCS
2005
ACM
15 years 5 months ago
Fast dictionary attacks on passwords using time-space tradeoff
Human-memorable passwords are a mainstay of computer security. To decrease vulnerability of passwords to bruteforce dictionary attacks, many organizations enforce complicated pass...
Arvind Narayanan, Vitaly Shmatikov
HICSS
2006
IEEE
143views Biometrics» more  HICSS 2006»
15 years 6 months ago
Assessment of Enterprise Information Security - The Importance of Information Search Cost
There are today several methods and standards available for assessment of the level of information security in an enterprise. A problem with these assessment methods is that they ...
Erik Johansson, Mathias Ekstedt, Pontus Johnson
INFOSCALE
2007
ACM
15 years 1 months ago
Evaluation study of a distributed caching based on query similarity in a P2P network
Several caching techniques have been used to reduce the bandwidth consumption and to provide faster answers in P2P systems. In this paper, we address the problem of reducing unnec...
Mouna Kacimi, Kokou Yétongnon
ER
2004
Springer
144views Database» more  ER 2004»
15 years 5 months ago
Expressing and Optimizing Similarity-Based Queries in SQL
Searching for similar objects (in terms of near and nearest neighbors) of a given query object from a large set is an essential task in many applications. Recent years have seen g...
Like Gao, Min Wang, Xiaoyang Sean Wang, Sriram Pad...