Sciweavers

27 search results - page 5 / 6
» Hybrid transitive trust mechanisms
Sort
View
ECAL
2007
Springer
15 years 3 months ago
Neuroevolution of Agents Capable of Reactive and Deliberative Behaviours in Novel and Dynamic Environments
Both reactive and deliberative qualities are essential for a good action selection mechanism. We present a model that embodies a hybrid of two very different neural network archit...
Edward Robinson, Timothy Ellis, Alastair Channon
ESORICS
2009
Springer
15 years 4 months ago
Privacy Preservation over Untrusted Mobile Networks
The proliferation of mobile devices has given rise to novel user-centric applications and services. In current mobile systems, users gain access to remote servers over mobile netwo...
Claudio Agostino Ardagna, Sushil Jajodia, Pierange...
161
Voted
WWCA
1998
Springer
15 years 1 months ago
Compact and Flexible Resolution of CBT Multicast Key-Distribution
In an open network such as the Internet, multicast security services typically start with group session-key distribution. Considering scalability for group communication among wide...
Kanta Matsuura, Yuliang Zheng, Hideki Imai
SP
2005
IEEE
188views Security Privacy» more  SP 2005»
15 years 3 months ago
BIND: A Fine-Grained Attestation Service for Secure Distributed Systems
In this paper, we propose BIND (Binding Instructions aNd Data),1 a fine-grained attestation service for securing distributed systems. Code attestation has recently received consi...
Elaine Shi, Adrian Perrig, Leendert van Doorn
ICAPR
2005
Springer
15 years 3 months ago
Hierarchical Clustering of Dynamical Systems Based on Eigenvalue Constraints
Abstract. This paper addresses the clustering problem of hidden dynamical systems behind observed multivariate sequences by assuming an interval-based temporal structure in the seq...
Hiroaki Kawashima, Takashi Matsuyama