Sciweavers

245 search results - page 16 / 49
» The Iterated Weakest Link
Sort
View
CORR
2010
Springer
146views Education» more  CORR 2010»
14 years 12 months ago
Multicast Outage Probability and Transmission Capacity of Multihop Wireless Networks
Multicast transmission, wherein the same packet must be delivered to multiple receivers, is an important aspect of sensor and tactical networks and has several distinctive traits ...
Chun-Hung Liu, Jeffrey G. Andrews
JOC
2007
133views more  JOC 2007»
14 years 11 months ago
Trapdoor Hard-to-Invert Group Isomorphisms and Their Application to Password-Based Authentication
In the security chain the weakest link is definitely the human one: human beings cannot remember long secrets and often resort to rather insecure solutions to keep track of their ...
Dario Catalano, David Pointcheval, Thomas Pornin
ICML
2003
IEEE
16 years 17 days ago
Link-based Classification
Over the past few years, a number of approximate inference algorithms for networked data have been put forth. We empirically compare the performance of three of the popular algori...
Qing Lu, Lise Getoor
TEI
2012
ACM
285views Hardware» more  TEI 2012»
13 years 7 months ago
Sketch-a-TUI: low cost prototyping of tangible interactions using cardboard and conductive ink
Graspable tangibles are now being explored on the current generation of capacitive touch surfaces, such as the iPad and the Android tablet. Because the size and form factor is rel...
Alexander Wiethoff, Hanna Schneider, Michael Rohs,...
PVLDB
2008
116views more  PVLDB 2008»
14 years 11 months ago
Accuracy estimate and optimization techniques for SimRank computation
The measure of similarity between objects is a very useful tool in many areas of computer science, including information retrieval. SimRank is a simple and intuitive measure of th...
Dmitry Lizorkin, Pavel Velikhov, Maxim N. Grinev, ...