Sciweavers

1348 search results - page 26 / 270
» Keynote Address I
Sort
View
SOCIALCOM
2010
14 years 7 months ago
A Decision Theoretic Approach to Data Leakage Prevention
Abstract--In both the commercial and defense sectors a compelling need is emerging for rapid, yet secure, dissemination of information. In this paper we address the threat of infor...
Janusz Marecki, Mudhakar Srivatsa, Pradeep Varakan...
ICC
2009
IEEE
171views Communications» more  ICC 2009»
14 years 7 months ago
IPsec-Based Anonymous Networking: A Working Implementation
Protecting users' privacy is becoming one of the rising issues for the success of future communications. The Internet in particular, with its open architecture, presents sever...
Csaba Király, Renato Lo Cigno
48
Voted
ICSE
2009
IEEE-ACM
15 years 4 months ago
Towards safety guarantees for service-oriented systems
In this paper I will address the problem of verifying that a service-oriented embedded system fulÀlls required safety guarantees. Services will be represented by collaborations a...
Basil Becker
GI
2004
Springer
15 years 3 months ago
Vision as an Exercise in Organic Computing
Abstract: The vision process is very complex and requires for its realization in artificial systems a fundamentally new technology for systems generation. This must be based on pr...
Christoph von der Malsburg
DRR
2004
15 years 3 days ago
Group discriminatory power of handwritten characters
Using handwritten characters we address two questions (i) what is the group identification performance of different alphabets (upper and lower case) and (ii) what are the best cha...
Catalin I. Tomai, Devika M. Kshirsagar, Sargur N. ...