Sciweavers

722 search results - page 80 / 145
» Information Theory and Security: Quantitative Information Fl...
Sort
View
91
Voted
ICISS
2007
Springer
15 years 6 months ago
Security in Practice - Security-Usability Chasm
Abstract. Computer systems security area has received increased attention from both academics and in industry. However, recent work indicates that substantial security gaps emerge ...
Atul Prakash
FOMI
2009
14 years 9 months ago
Modular Ontologies for Architectural Design
Abstract. The design of architectural environments has to take into account various sources of heterogeneous information. Not only quantitative spatial constraints and qualitative ...
Joana Hois, Mehul Bhatt, Oliver Kutz
ASC
2011
14 years 7 months ago
A rough set approach to multiple dataset analysis
In the area of data mining, the discovery of valuable changes and connections (e.g., causality) from multiple data sets has been recognized as an important issue. This issue essen...
Ken Kaneiwa
WWW
2010
ACM
15 years 6 months ago
Alhambra: a system for creating, enforcing, and testing browser security policies
Alhambra is a browser-based system designed to enforce and test web browser security policies. At the core of Alhambra is a policyenhanced browser supporting fine-grain security ...
Shuo Tang, Chris Grier, Onur Aciiçmez, Samu...
MOBIHOC
2003
ACM
15 years 11 months ago
ANODR: anonymous on demand routing with untraceable routes for mobile ad-hoc networks
In hostile environments, the enemy can launch traffic analysis against interceptable routing information embedded in routing messages and data packets. Allowing adversaries to tra...
Jiejun Kong, Xiaoyan Hong