Sciweavers

556 search results - page 82 / 112
» An Abstract Reduction Model for Computer Security Risk
Sort
View
TLCA
1995
Springer
15 years 5 months ago
Typed Operational Semantics
operator abstraction is a language construct relevant to object oriented programming languages and to ML2000, the successor to Standard ML. In this paper, we introduce Fω ≤, a ...
Healfdene Goguen
ICPR
2002
IEEE
15 years 6 months ago
Real-Time Cooperative Multi-Target Tracking by Communicating Active Vision Agents
Abstract Target detection and tracking is one of the most important and fundamental technologies to develop real world computer vision systems such as security and traffic monitori...
Norimichi Ukita, Takashi Matsuyama
CCS
2005
ACM
15 years 7 months ago
A framework for concrete reputation-systems with applications to history-based access control
In a reputation-based trust-management system, agents maintain information about the past behaviour of other agents. This information is used to guide future trust-based decisions...
Karl Krukow, Mogens Nielsen, Vladimiro Sassone
104
Voted
JCP
2007
122views more  JCP 2007»
15 years 1 months ago
Converting Group Key Agreement Protocol into Password-Based Setting - Case Study
Abstract— Converting a secure group key agreement protocol into password-based setting is not a trivial task. The security of a password-based scheme hinges on preventing diction...
Ratna Dutta
TMM
2011
146views more  TMM 2011»
14 years 8 months ago
Game-Theoretic Strategies and Equilibriums in Multimedia Fingerprinting Social Networks
Abstract—Multimedia social network is a network infrastructure in which the social network users share multimedia contents with all different purposes. Analyzing user behavior in...
W. Sabrina Lin, H. Vicky Zhao, K. J. Ray Liu