Sciweavers

24 search results - page 3 / 5
» Understanding the security and robustness of SIFT
Sort
View
ESORICS
2007
Springer
13 years 11 months ago
Modular Access Control Via Strategic Rewriting
Abstract. Security policies, in particular access control, are fundamental elements of computer security. We address the problem of authoring and analyzing policies in a modular wa...
Daniel J. Dougherty, Claude Kirchner, Hél&e...
AGENTS
2000
Springer
13 years 9 months ago
Scalability of a Transactional Infrastructure for Multi-Agent Systems
Abstract. One of the reasons for attending to agent technology is the evergrowing complexity of information systems and the increasing difficulty to foresee and plan for all potent...
Khaled Nagi
USS
2008
13 years 7 months ago
In Defense of Pseudorandom Sample Selection
Generation of random numbers is a critical component of existing post-election auditing techniques. Recent work has largely discouraged the use of all pseudorandom number generato...
Joseph A. Calandrino, J. Alex Halderman, Edward W....
BMCBI
2007
127views more  BMCBI 2007»
13 years 5 months ago
Predicting the phenotypic effects of non-synonymous single nucleotide polymorphisms based on support vector machines
Background: Human genetic variations primarily result from single nucleotide polymorphisms (SNPs) that occur approximately every 1000 bases in the overall human population. The no...
Jian Tian, Ningfeng Wu, Xuexia Guo, Jun Guo, Juhua...
IMC
2006
ACM
13 years 11 months ago
Finding diversity in remote code injection exploits
Remote code injection exploits inflict a significant societal cost, and an active underground economy has grown up around these continually evolving attacks. We present a method...
Justin Ma, John Dunagan, Helen J. Wang, Stefan Sav...