Sciweavers

218 search results - page 2 / 44
» An Operational Model for Mutual Awareness
Sort
View
ICASSP
2009
IEEE
14 years 1 days ago
Complete characterization of perfectly secure stego-systems with mutually independent embedding operation
Without any assumption on the cover source, this paper presents a complete characterization of all perfectly secure stego-systems that employ mutually independent embedding operat...
Tomás Filler, Jessica J. Fridrich
ACISP
2008
Springer
13 years 11 months ago
Enforcing User-Aware Browser-Based Mutual Authentication with Strong Locked Same Origin Policy
The standard solution for mutual authentication between human users and servers on the Internet is to execute a TLS handshake during which the server authenticates using a X.509 ce...
Sebastian Gajek, Mark Manulis, Jörg Schwenk
SIGOPS
2008
141views more  SIGOPS 2008»
13 years 5 months ago
Using model checkers in an introductory course on operating systems
During the last three years, we have been experimenting with the use of the Uppaal model checker in an introductory course on operating systems for first-year Computer Science stu...
Roelof Hamberg, Frits W. Vaandrager
MDM
2001
Springer
138views Communications» more  MDM 2001»
13 years 9 months ago
Operating System and Algorithmic Techniques for Energy Scalable Wireless Sensor Networks
An system-level power management technique for massively distributed wireless microsensor networks is proposed. A power aware sensor node model is introduced which enables the embe...
Amit Sinha, Anantha Chandrakasan
AAAI
2007
13 years 7 months ago
Mutual Belief Revision: Semantics and Computation
This paper presents both a semantic and a computational model for multi-agent belief revision. We show that these two models are equivalent but serve different purposes. The seman...
Yi Jin, Michael Thielscher, Dongmo Zhang