Sciweavers

4887 search results - page 951 / 978
» System Level Design Using C
Sort
View
FC
2010
Springer
171views Cryptology» more  FC 2010»
15 years 5 months ago
The Phish-Market Protocol: Securely Sharing Attack Data between Competitors
A key way in which banks mitigate the effects of phishing is to remove fraudulent websites or suspend abusive domain names. This ‘take-down’ is often subcontracted to special...
Tal Moran, Tyler Moore
ASSETS
2005
ACM
15 years 3 months ago
Toward Goldilocks' pointing device: determining a "just right" gain setting for users with physical impairments
We designed and evaluated an agent that recommends a pointing device gain for a given user, with mixed success. 12 participants with physical impairments used the Input Device Age...
Heidi Horstmann Koester, Edmund F. LoPresti, Richa...
IMC
2007
ACM
15 years 3 months ago
Acyclic type-of-relationship problems on the internet: an experimental analysis
An experimental study of the feasibility and accuracy of the acyclicity approach introduced in [14] for the inference of business relationships among autonomous systems (ASes) is ...
Benjamin Hummel, Sven Kosub
CORR
2007
Springer
114views Education» more  CORR 2007»
15 years 1 months ago
High Performance Direct Gravitational N-body Simulations on Graphics Processing Units
We present the results of gravitational direct N-body simulations using the commercial graphics processing units (GPU) NVIDIA Quadro FX1400 and GeForce 8800GTX, and compare the re...
Simon Portegies Zwart, Robert G. Belleman, Peter G...
JCB
2007
144views more  JCB 2007»
15 years 1 months ago
Statistical Estimation of Statistical Mechanical Models: Helix-Coil Theory and Peptide Helicity Prediction
Analysis of biopolymer sequences and structures generally adopts one of two approaches: use of detailed biophysical theoretical models of the system with experimentally-determined...
Scott C. Schmidler, Joseph E. Lucas, Terrence G. O...