Sciweavers

556 search results - page 78 / 112
» An Abstract Reduction Model for Computer Security Risk
Sort
View
124
Voted
JMM2
2007
122views more  JMM2 2007»
15 years 1 months ago
Hierarchical Model-Based Activity Recognition With Automatic Low-Level State Discovery
Abstract— Activity recognition in video streams is increasingly important for both the computer vision and artificial intelligence communities. Activity recognition has many app...
Justin Muncaster, Yunqian Ma
100
Voted
GRID
2010
Springer
14 years 11 months ago
Parallel SAT Solving on Peer-to-Peer Desktop Grids
Abstract Satciety is a distributed parallel satisfiability (SAT) solver which focuses on tackling the domainspecific problems inherent to one of the most challenging environments f...
Sven Schulz, Wolfgang Blochinger
MMMACNS
2001
Springer
15 years 6 months ago
Typed MSR: Syntax and Examples
Abstract. Many design flaws and incorrect analyses of cryptographic protoAppeared in the Proceedings of the First International Workshop on Mathematical Methods, Models and Archit...
Iliano Cervesato
108
Voted
JCP
2006
120views more  JCP 2006»
15 years 1 months ago
Password-authenticated Key Exchange using Efficient MACs
Abstract-- This paper is concerned with passwordauthenticated key agreement protocols. Designing such protocols represents an interesting challenge since there is no standard way o...
Maurizio Adriano Strangio
118
Voted
TISSEC
2008
202views more  TISSEC 2008»
15 years 1 months ago
A Framework for Identifying Compromised Nodes in Wireless Sensor Networks
compromised sensor nodes. The framework provides an appropriate abstraction of applicationspecific detection mechanisms and models the unique properties of sensor networks. Based o...
Qing Zhang, Ting Yu, Peng Ning