Sciweavers

101 search results - page 15 / 21
» Formal approach to security metrics.: what does
Sort
View
101
Voted
CSSW
2007
15 years 2 months ago
Weaving Space into the Web of Trust: An Asymmetric Spatial Trust Model for Social Networks
The proliferation of Geo-Information (GI) production in web-based collaboration environments such as mapping mashups built on top of mapping APIs such as GoogleMaps API poses new c...
Mohamed Bishr
89
Voted
HICSS
2003
IEEE
97views Biometrics» more  HICSS 2003»
15 years 5 months ago
Efficacy and Sustainability of a Telerehabilitation Program
Efficacy and Sustainability of a Telerehabilitation Program Sustainability and appropriateness of care are important components for healthcare systems as they begin integrating te...
Cynthia Scheideman-Miller, Pamela G. Clark, Al Moo...
103
Voted
CCS
2008
ACM
15 years 2 months ago
A general model of probabilistic packet marking for IP traceback
In this paper, we model Probabilistic Packet Marking (PPM) schemes for IP traceback as an identification problem of a large number of markers. Each potential marker is associated ...
Liming Lu, Mun Choon Chan, Ee-Chien Chang
DRM
2007
Springer
15 years 6 months ago
Slicing obfuscations: design, correctness, and evaluation
The goal of obfuscation is to transform a program, without affecting its functionality, such that some secret information within the program can be hidden for as long as possible...
Anirban Majumdar, Stephen Drape, Clark D. Thombors...
IROS
2009
IEEE
129views Robotics» more  IROS 2009»
15 years 7 months ago
Predicting the navigation performance of underwater vehicles
— In this paper we present a general framework for predicting the positioning uncertainty of underwater vehicles. We apply this framework to common examples from marine robotics:...
Brian Bingham