Sciweavers

4323 search results - page 298 / 865
» Callback Implementations in C
Sort
View
CCS
2007
ACM
15 years 11 months ago
Optimal security hardening using multi-objective optimization on attack tree models of networks
Researchers have previously looked into the problem of determining if a given set of security hardening measures can effectively make a networked system secure. Many of them also...
Rinku Dewri, Nayot Poolsappasit, Indrajit Ray, Dar...
129
Voted
EGOV
2007
Springer
15 years 11 months ago
A Trust-Centered Approach for Building E-Voting Systems
eVoting is a challenging approach for increasing eParticipation. However, lack of citizens’ trust seems to be a main obstacle that hinders its successful realization. In this pap...
Athanasios Antoniou, C. Korakas, Christos Manolopo...
152
Voted
EMSOFT
2007
Springer
15 years 11 months ago
The algebra of connectors: structuring interaction in BIP
We provide an algebraic formalisation of connectors in BIP. These are used to structure interactions in a component-based system. A connector relates a set of typed ports. Types a...
Simon Bliudze, Joseph Sifakis
ICCS
2007
Springer
15 years 11 months ago
Towards Real-Time Distributed Signal Modeling for Brain-Machine Interfaces
New architectures for Brain-Machine Interface communication and control use mixture models for expanding rehabilitation capabilities of disabled patients. Here we present and test ...
Jack DiGiovanna, Loris Marchal, Prapaporn Rattanat...
IPSN
2007
Springer
15 years 11 months ago
Acoustic source localization using the acoustic ENSBox
Field biologists use animal sounds to discover the presence of individuals and to study their behavior. The recent development of new deployable acoustic sensor platforms presents...
Andreas M. Ali, Kung Yao, Travis C. Collier, Charl...