Sciweavers

549 search results - page 86 / 110
» Belief-Based Risk Analysis
Sort
View
IPPS
2007
IEEE
15 years 6 months ago
Transaction Based Authentication Scheme for Mobile Communication: A Cognitive Agent Based Approach
The vulnerable air interface, device level constraints, and insecure encryption techniques of wireless networks have naturally increased the chance of attacker obtaining users inf...
B. Sathish Babu, Pallapa Venkataram
SRDS
2007
IEEE
15 years 6 months ago
Using Hidden Semi-Markov Models for Effective Online Failure Prediction
A proactive handling of faults requires that the risk of upcoming failures is continuously assessed. One of the promising approaches is online failure prediction, which means that...
Felix Salfner, Miroslaw Malek
EGOV
2007
Springer
15 years 6 months ago
A Trust-Centered Approach for Building E-Voting Systems
eVoting is a challenging approach for increasing eParticipation. However, lack of citizens’ trust seems to be a main obstacle that hinders its successful realization. In this pap...
Athanasios Antoniou, C. Korakas, Christos Manolopo...
VLDB
2007
ACM
160views Database» more  VLDB 2007»
15 years 6 months ago
Over-encryption: Management of Access Control Evolution on Outsourced Data
Data outsourcing is emerging today as a successful paradigm allowing users and organizations to exploit external services for the distribution of resources. A crucial problem to b...
Sabrina De Capitani di Vimercati, Sara Foresti, Su...
ICMCS
2006
IEEE
115views Multimedia» more  ICMCS 2006»
15 years 5 months ago
People Identification with Limited Labels in Privacy-Protected Video
People identification is an essential task for video content analysis in a surveillance system. A good classifier, however, requires a large amount of training data, which may not...
Yi Chang, Rong Yan, Datong Chen, Jie Yang