Sciweavers

2996 search results - page 583 / 600
» Dynamic Traveling Repairperson Problem for dynamic systems
Sort
View
NDSS
2008
IEEE
15 years 8 months ago
Automatic Network Protocol Analysis
Protocol reverse engineering is the process of extracting application-level specifications for network protocols. Such specifications are very helpful in a number of security-re...
Gilbert Wondracek, Paolo Milani Comparetti, Christ...
SRDS
2008
IEEE
15 years 8 months ago
Probabilistic Failure Detection for Efficient Distributed Storage Maintenance
Distributed storage systems often use data replication to mask failures and guarantee high data availability. Node failures can be transient or permanent. While the system must ge...
Jing Tian, Zhi Yang, Wei Chen, Ben Y. Zhao, Yafei ...
92
Voted
SOUPS
2006
ACM
15 years 7 months ago
Seeing further: extending visualization as a basis for usable security
The focus of our approach to the usability considerations of privacy and security has been on providing people with information they can use to understand the implications of thei...
Jennifer Ann Rode, Carolina Johansson, Paul DiGioi...
WIKIS
2005
ACM
15 years 7 months ago
qwikWeb: integrating mailing list and WikiWikiWeb for group communication
We have developed a new powerful group communication system qwikWeb, which is an integration of a WikiWikiWeb (wiki) and a mailing list system. Mailing lists are useful for exchan...
Kouichirou Eto, Satoru Takabayashi, Toshiyuki Masu...
AVBPA
2005
Springer
312views Biometrics» more  AVBPA 2005»
15 years 7 months ago
Securing Electronic Medical Records Using Biometric Authentication
Abstract. Ensuring the security of medical records is becoming an increasingly important problem as modern technology is integrated into existing medical services. As a consequence...
Stephen Krawczyk, Anil K. Jain