Sciweavers

814 search results - page 160 / 163
» Classification of Physical Interactions between Two Subjects
Sort
View
ATAL
2005
Springer
15 years 3 months ago
Voting policies that cope with unreliable agents
Collaboration plays a critical role when a team is striving for goals that are difficult to achieve by an individual. In previous work, we defined the ETAPP (Environment-TaskAgen...
Christian Guttmann, Ingrid Zukerman
79
Voted
CISC
2005
Springer
109views Cryptology» more  CISC 2005»
15 years 3 months ago
Enforcing Email Addresses Privacy Using Tokens
We propose a system which allows users to monitor how their email addresses are used and how they spread over the Internet. This protects the privacy of the user and can reduce the...
Roman Schlegel, Serge Vaudenay
IMC
2004
ACM
15 years 2 months ago
Measurement based characterization and provisioning of IP VPNs
Virtual Private Networks provide secure and reliable communication between customer sites. With increase in number and size of VPNs, providers need efficient provisioning techniqu...
Satish Raghunath, K. K. Ramakrishnan, Shivkumar Ka...
CSFW
2003
IEEE
15 years 2 months ago
A Procedure for Verifying Security Against Type Confusion Attacks
A type confusion attack is one in which a principal accepts data of one type as data of another. Although it has been shown by Heather et al. that there are simple formatting conv...
Catherine Meadows
PLDI
2010
ACM
15 years 2 months ago
Resolving and exploiting the k-CFA paradox: illuminating functional vs. object-oriented program analysis
Low-level program analysis is a fundamental problem, taking the shape of “flow analysis” in functional languages and “points-to” analysis in imperative and object-oriente...
Matthew Might, Yannis Smaragdakis, David Van Horn