Sciweavers

1286 search results - page 160 / 258
» A Practical Modelling Notation for Secure Distributed Comput...
Sort
View
96
Voted
IH
2001
Springer
15 years 5 months ago
Real World Patterns of Failure in Anonymity Systems
Abstract. We present attacks on the anonymity and pseudonymity provided by a “lonely hearts” dating service and by the HushMail encrypted email system. We move on to discuss so...
Richard Clayton, George Danezis, Markus G. Kuhn
125
Voted
COOPIS
1998
IEEE
15 years 5 months ago
Context Mediation on Wall Street
This paper reports on a practical implementation of a context mediator for the fixed income securities industry. We describe industry circumstances and the data and calculation se...
Allen Moulton, Stuart E. Madnick, Michael Siegel
115
Voted
HICSS
2006
IEEE
261views Biometrics» more  HICSS 2006»
15 years 6 months ago
e-Risk Management with Insurance: A Framework Using Copula Aided Bayesian Belief Networks
: e-business organizations are heavily dependent on distributed 24X7 robust information computing systems, for their daily operations. To secure distributed online transactions, th...
Arunabha Mukhopadhyay, Samir Chatterjee, Debashis ...
DSN
2002
IEEE
15 years 5 months ago
Model Checking Performability Properties
Model checking has been introduced as an automated technique to verify whether functional properties, expressed in a formal logic like computational tree logic (CTL), do hold in a...
Boudewijn R. Haverkort, Lucia Cloth, Holger Herman...
CVPR
2009
IEEE
1133views Computer Vision» more  CVPR 2009»
16 years 7 months ago
Hierarchical Spatio-Temporal Context Modeling for Action Recognition
The problem of recognizing actions in realistic videos is challenging yet absorbing owing to its great potentials in many practical applications. Most previous research is limit...
Jintao Li, Ju Sun, Loong Fah Cheong, Shuicheng Yan...