Sciweavers

8655 search results - page 542 / 1731
» Challenges for Trusted Computing
Sort
View
BMCBI
2010
147views more  BMCBI 2010»
15 years 5 months ago
Learning biological network using mutual information and conditional independence
Background: Biological networks offer us a new way to investigate the interactions among different components and address the biological system as a whole. In this paper, a revers...
Dong-Chul Kim, Xiaoyu Wang, Chin-Rang Yang, Jean G...
173
Voted
COMCOM
2010
129views more  COMCOM 2010»
15 years 5 months ago
Fast certificate-based authentication scheme in multi-operator maintained wireless mesh networks
In this paper, we consider QoS aware mesh networks that are maintained by multiple operators and they cooperate in the provision of networking services to the mesh clients. In ord...
Levente Buttyán, László D&oac...
AAMAS
2006
Springer
15 years 5 months ago
CONFIDANT: Collaborative Object Notification Framework for Insider Defense using Autonomous Network Transactions
File Integrity Analyzers serve as a component of an Intrusion Detection environment by performing filesystem inspections to verify the content of security-critical files in order ...
Adam J. Rocke, Ronald F. DeMara
AIS
2006
Springer
15 years 5 months ago
Togetherness and respect: ethical concerns of privacy in Global Web Societies
Today's computer network technologies are sociologically founded on hunter-gatherer principles; common users may be possible subjects of surveillance and sophisticated Interne...
Gordana Dodig-Crnkovic, Virginia Horniak
IANDC
2007
152views more  IANDC 2007»
15 years 5 months ago
The reactive simulatability (RSIM) framework for asynchronous systems
We define reactive simulatability for general asynchronous systems. Roughly, simulatability means that a real system implements an ideal system (specification) in a way that pre...
Michael Backes, Birgit Pfitzmann, Michael Waidner