Sciweavers

692 search results - page 98 / 139
» Some research questions for computational transportation sci...
Sort
View
CHI
2011
ACM
14 years 1 months ago
Does domain highlighting help people identify phishing sites?
Phishers are fraudsters that mimic legitimate websites to steal user’s credential information and exploit that information for identity theft and other criminal activities. Vari...
Eric Lin, Saul Greenberg, Eileah Trotter, David Ma...
ICS
2010
Tsinghua U.
15 years 7 months ago
Cryptography by Cellular Automata or How Fast Can Complexity Emerge in Nature?
Computation in the physical world is restricted by the following spatial locality constraint: In a single unit of time, information can only travel a bounded distance in space. A ...
Benny Applebaum, Yuval Ishai, Eyal Kushilevitz
IMC
2007
ACM
14 years 11 months ago
Cryptographic strength of ssl/tls servers: current and recent practices
The Secure Socket Layer (SSL) and its variant, Transport Layer Security (TLS), are used toward ensuring server security. In this paper, we characterize the cryptographic strength ...
Homin K. Lee, Tal Malkin, Erich M. Nahum
IPPS
2008
IEEE
15 years 4 months ago
Implementing an industrial-strength academic cyberinfrastructure at Purdue University
Purdue University operates one of the largest cycle recovery systems in existence in academia based on the Condor workload management system. This system represents a valuable and...
Preston M. Smith, Thomas J. Hacker, C. X. Song
CORR
2011
Springer
188views Education» more  CORR 2011»
14 years 5 months ago
Primitive words and roots of words
In the algebraic theory of codes and formal languages, the set Q of all primitive words over some alphabet Σ has received special interest. With this survey article we give an ove...
Gerhard Lischke