Sciweavers

556 search results - page 65 / 112
» An Abstract Reduction Model for Computer Security Risk
Sort
View
ICCSA
2004
Springer
15 years 5 months ago
Practical Digital Signature Generation Using Biometrics
Abstract. It is desirable to generate a digital signature using biometrics but not practicable because of its inaccurate measuring and potential hill-climbing attacks, without usin...
Taekyoung Kwon, Jaeil Lee
GD
2008
Springer
15 years 27 days ago
Graph Drawing for Security Visualization
Abstract. As the number of devices connected to the internet continues to grow rapidly and software systems are being increasingly deployed on the web, security and privacy have be...
Roberto Tamassia, Bernardo Palazzi, Charalampos Pa...
IJCAI
2003
15 years 1 months ago
Approximating Game-Theoretic Optimal Strategies for Full-scale Poker
The computation of the first complete approximations of game-theoretic optimal strategies for fullscale poker is addressed. Several abstraction techniques are combined to represe...
Darse Billings, Neil Burch, Aaron Davidson, Robert...
VIS
2004
IEEE
115views Visualization» more  VIS 2004»
16 years 1 months ago
Visualization in Grid Computing Environments
Grid computing provides a challenge for visualization system designers. In this research, we evolve the dataflow concept to allow parts of the visualization process to be executed...
Ken Brodlie, David A. Duce, Julian R. Gallop, Musb...
ICALP
1999
Springer
15 years 4 months ago
Wide Area Computation
Abstract. The last decades have seen the emergence of the sea of objects paradigm for structuring complex distributed systems on workstations and local area networks. In this appro...
Luca Cardelli