Sciweavers

539 search results - page 24 / 108
» The N R One Time Password System
Sort
View
MOR
2010
121views more  MOR 2010»
14 years 8 months ago
Customer Abandonment in Many-Server Queues
We study G/G/n + GI queues in which customer patience times are independent, identically distributed following a general distribution. When a customer’s waiting time in queue ex...
J. G. Dai, Shuangchi He
NHM
2010
101views more  NHM 2010»
14 years 4 months ago
Stars of vibrating strings: Switching boundary feedback stabilization
We consider a star-shaped network consisting of a single node with N 3 connected arcs. The dynamics on each arc is governed by the wave equation. The arcs are coupled at the node ...
Martin Gugat, Mario Sigalotti
HICSS
2003
IEEE
200views Biometrics» more  HICSS 2003»
15 years 2 months ago
A Dynamic Assignment Problem in a Mobile System with Limited Bandwidth
The assignment problem originally arising from parallel and distributed computing has been investigated intensively since the 70’s when Harold Stone proposed a method to solve i...
Yang Wang 0006, Thomas Kunz
101
Voted
PET
2007
Springer
15 years 3 months ago
Browser-Based Attacks on Tor
This paper describes a new attack on the anonymity of web browsing with Tor. The attack tricks a user’s web browser into sending a distinctive signal over the Tor network that ca...
Timothy G. Abbott, Katherine J. Lai, Michael R. Li...
CHI
2005
ACM
14 years 11 months ago
Experience buffers: a socially appropriate, selective archiving tool for evidence-based care
Diagnosis, treatment, and monitoring of interventions for children with autism can profit most when caregivers have substantial amounts of data they can easily record and review a...
Gillian R. Hayes, Khai N. Truong, Gregory D. Abowd...