Sciweavers

1612 search results - page 256 / 323
» About models of security protocols
Sort
View
86
Voted
SP
2006
IEEE
110views Security Privacy» more  SP 2006»
15 years 3 months ago
Privacy and Contextual Integrity: Framework and Applications
Contextual integrity is a conceptual framework for understanding privacy expectations and their implications developed in the literature on law, public policy, and political philo...
Adam Barth, Anupam Datta, John C. Mitchell, Helen ...
SPEECH
2011
14 years 4 months ago
Intelligibility predictors and neural representation of speech
Intelligibility predictors tell us a great deal about human speech perception, in particular which acoustic factors strongly effect human behavior, and which do not. A particular...
Bryce E. Lobdell, Jont B. Allen, Mark Hasegawa-Joh...
AAAI
2012
13 years 7 days ago
POMDPs Make Better Hackers: Accounting for Uncertainty in Penetration Testing
Penetration Testing is a methodology for assessing network security, by generating and executing possible hacking attacks. Doing so automatically allows for regular and systematic...
Carlos Sarraute, Olivier Buffet, Jörg Hoffman...
SAFECOMP
1999
Springer
15 years 2 months ago
Towards Statistical Control of an Industrial Test Process
We present an ongoing experience aimed at introducing statistical process control techniques to one crucial test phase, namely Function Test, of a real world software development p...
Gaetano Lombardi, Emilia Peciola, Raffaela Mirando...
ATAL
2006
Springer
15 years 1 months ago
Agent interaction in distributed POMDPs and its implications on complexity
The ability to coordinate effectively is critical for agents to accomplish their goals in a multi-agent system. A number of researchers have modeled the coordination problem for m...
Jiaying Shen, Raphen Becker, Victor R. Lesser