Sciweavers

1092 search results - page 200 / 219
» A Canonical Face Based Virtual Face Modeling
Sort
View
CTRSA
2003
Springer
116views Cryptology» more  CTRSA 2003»
15 years 7 months ago
Intrusion-Resilient Public-Key Encryption
Exposure of secret keys seems to be inevitable, and may in practice represent the most likely point of failure in a cryptographic system. Recently, the notion of intrusion-resilien...
Yevgeniy Dodis, Matthew K. Franklin, Jonathan Katz...
146
Voted
SMC
2007
IEEE
125views Control Systems» more  SMC 2007»
15 years 8 months ago
Scaling with digital connection: Services innovation
—Digitization of production factors, including the knowledge for knowledge workers and consumers, opens almost infinite potential to connect persons, systems, processes, enterpri...
Cheng Hsu
RAID
1999
Springer
15 years 6 months ago
Defending against a Denial-of-Service Attack on TCP
In this paper we propose a real-time anomaly detection method for detecting TCP SYN-flooding attacks. This method is based on the intensities of SYN segments which are measured on...
Pars Mutaf
AAAI
2007
15 years 4 months ago
A Modal Logic for Beliefs and Pro Attitudes
Agents’ pro attitudes such as goals, intentions, desires, wishes, and judgements of satisfactoriness play an important role in how agents act rationally. To provide a natural an...
Kaile Su, Abdul Sattar, Han Lin, Mark Reynolds
121
Voted
MANSCI
2007
169views more  MANSCI 2007»
15 years 1 months ago
Performance Contracting in After-Sales Service Supply Chains
Performance-based contracting is reshaping service support supply chains in capital intensive industries such as aerospace and defense. Known as Power by the Hour in the private s...
Sang-Hyun Kim, Morris A. Cohen, Serguei Netessine