Sciweavers

908 search results - page 169 / 182
» From communication networks to fuzzy sets
Sort
View
86
Voted
CDC
2009
IEEE
186views Control Systems» more  CDC 2009»
15 years 3 months ago
Distributed function and time delay estimation using nonparametric techniques
In this paper we analyze the problem of estimating a function from different noisy data sets collected by spatially distributed sensors and subject to unknown temporal shifts. We p...
Damiano Varagnolo, Gianluigi Pillonetto, Luca Sche...
ACSAC
2006
IEEE
15 years 3 months ago
Data Sandboxing: A Technique for Enforcing Confidentiality Policies
When an application reads private / sensitive information and subsequently communicates on an output channel such as a public file or a network connection, how can we ensure that ...
Tejas Khatiwala, Raj Swaminathan, V. N. Venkatakri...
GECCO
2006
Springer
168views Optimization» more  GECCO 2006»
15 years 3 months ago
An artificial immune system and its integration into an organic middleware for self-protection
Our human body is well protected by antibodies from our biological immune system. This protection system matured over millions of years and has proven its functionality. In our re...
Andreas Pietzowski, Wolfgang Trumler, Theo Ungerer
CCS
2008
ACM
15 years 1 months ago
Dependent link padding algorithms for low latency anonymity systems
Low latency anonymity systems are susceptive to traffic analysis attacks. In this paper, we propose a dependent link padding scheme to protect anonymity systems from traffic analy...
Wei Wang 0002, Mehul Motani, Vikram Srinivasan
INTERACT
2007
15 years 1 months ago
Usability Challenges in Security and Privacy Policy-Authoring Interfaces
Abstract. Policies, sets of rules that govern permission to access resources, have long been used in computer security and online privacy management; however, the usability of auth...
Robert W. Reeder, Clare-Marie Karat, John Karat, C...