Sciweavers

4072 search results - page 688 / 815
» Designing an Optimal Network Using the Cross-Entropy Method
Sort
View
91
Voted
MSS
2007
IEEE
129views Hardware» more  MSS 2007»
15 years 6 months ago
Cryptographic Security for a High-Performance Distributed File System
Storage systems are increasingly subject to attacks. Cryptographic file systems mitigate the danger of exposing data by using encryption and integrity protection methods and guar...
Roman Pletka, Christian Cachin
92
Voted
EEE
2005
IEEE
15 years 5 months ago
Who Counts Your Votes?
Open and fair elections are paramount to modern democracy. Although some people claim that the penciland-paper systems used in countries such as Canada and UK are still the best m...
Halina Kaminski, Lila Kari, Mark Perry
85
Voted
HYBRID
2005
Springer
15 years 5 months ago
Hybrid Decentralized Control of Large Scale Systems
Abstract. Motivated by three applications which are under investigation at the Honeywell Research Laboratory in Minneapolis, we introduce a class of large scale control problems. I...
Francesco Borrelli, Tamás Keviczky, Gary J....
ICCSA
2005
Springer
15 years 5 months ago
Attacks on Port Knocking Authentication Mechanism
Abstract. Research in authentication mechanisms has led to the design and development of new schemes. The security provided by these procedures must be reviewed and analyzed before...
Antonio Izquierdo Manzanares, Joaquín Torre...
ICIC
2005
Springer
15 years 5 months ago
An Intelligent Assistant for Public Transport Management
This paper describes the architecture of a computer system conceived as an intelligent assistant for public transport management. The goal of the system is to help operators of a c...
Martín Molina