Sciweavers

287 search results - page 30 / 58
» A Foundation for Defining Security Requirements in Grid Comp...
Sort
View
ICPR
2010
IEEE
15 years 28 days ago
Inverse Multiple Instance Learning for Classifier Grids
Abstract--Recently, classifier grids have shown to be a considerable alternative for object detection from static cameras. However, one drawback of such approaches is drifting if a...
Sabine Sternig, Peter M. Roth, Horst Bischof
72
Voted
CLUSTER
2002
IEEE
15 years 2 months ago
User-Level Remote Data Access in Overlay Metacomputers
A practical problem faced by users of metacomputers and computational grids is: If my computation can move from one system to another, how can I ensure that my data will still be ...
Jeff Siegel, Paul Lu
92
Voted
LCN
1999
IEEE
15 years 1 months ago
An Integrated Software Immune System: A Framework for Automated Network Management, System Health, and Security
Maintaining the integrity of large-scale networks is becoming an increasingly daunting task as networks expand at an unprecedented rate. The majority of present network monitoring...
Michael Gilfix
KDD
2004
ACM
160views Data Mining» more  KDD 2004»
15 years 10 months ago
k-TTP: a new privacy model for large-scale distributed environments
Secure multiparty computation allows parties to jointly compute a function of their private inputs without revealing anything but the output. Theoretical results [2] provide a gen...
Bobi Gilburd, Assaf Schuster, Ran Wolff
IEEESP
2008
136views more  IEEESP 2008»
14 years 9 months ago
The Crutial Way of Critical Infrastructure Protection
Today, critical infrastructures like the power grid are essentially physical processes controlled by computers connected by networks. They are usually as vulnerable as any other i...
Alysson Neves Bessani, Paulo Sousa, Miguel Correia...