Sciweavers

14897 search results - page 2655 / 2980
» Environment for statistical computing
Sort
View
OTM
2007
Springer
15 years 10 months ago
Bayesian Analysis of Secure P2P Sharing Protocols
Ad hoc and peer-to-peer (P2P) computing paradigms pose a number of security challenges. The deployment of classic security protocols to provide services such as node authentication...
Esther Palomar, Almudena Alcaide, Juan M. Est&eacu...
POLICY
2007
Springer
15 years 10 months ago
On Automated Policy Generation for Mobile Ad Hoc Networks
In this paper we describe an approach to the problem of automated policy generation for mobile ad hoc networks. The automated policy generation problem is difficult in its own rig...
Cho-Yu Jason Chiang, Gary Levin, Yitzchak Gottlieb...
RAID
2007
Springer
15 years 10 months ago
Swaddler: An Approach for the Anomaly-Based Detection of State Violations in Web Applications
In recent years, web applications have become tremendously popular, and nowadays they are routinely used in security-critical environments, such as medical, financial, and milita...
Marco Cova, Davide Balzarotti, Viktoria Felmetsger...
ROBOCUP
2007
Springer
140views Robotics» more  ROBOCUP 2007»
15 years 10 months ago
Tailored Real-Time Simulation for Teams of Humanoid Robots
Abstract. Developing and testing the key modules of autonomous humanoid soccer robots (e.g., for vision, localization, and behavior control) in software-in-the-loop (SIL) experimen...
Martin Friedmann, Karen Petersen, Oskar von Stryk
WISA
2007
Springer
15 years 10 months ago
A Compositional Multiple Policies Operating System Security Model
Multilevel security policies aim at only confidentiality assurance, with less consideration on integrity assurance and weakness in expressing channel control policies. Besides, the...
Lei Xia, Wei Huang, Hao Huang
« Prev « First page 2655 / 2980 Last » Next »