Sciweavers

1597 search results - page 26 / 320
» Mental Models of Computer Security
Sort
View
ASIACRYPT
2009
Springer
15 years 8 months ago
Secure Multi-party Computation Minimizing Online Rounds
Multi-party secure computations are general important procedures to compute any function while keeping the security of private inputs. In this work we ask whether preprocessing can...
Seung Geol Choi, Ariel Elbaz, Tal Malkin, Moti Yun...
103
Voted
ESORICS
2005
Springer
15 years 7 months ago
On Scalability and Modularisation in the Modelling of Network Security Systems
Abstract. As the use of computers and data communication technologies spreads, network security systems are becoming increasingly complex, due to the incorporation of a variety of ...
João Porto de Albuquerque, Heiko Krumm, Pau...
AGENTS
2000
Springer
15 years 6 months ago
A knowledge-based approach for designing intelligent team training systems
This paper presents a knowledge approach to designing team training systems using intelligent agents. We envision a computer-based training system in which teams are trained by pu...
Jianwen Yin, Michael S. Miller, Thomas R. Ioerger,...
95
Voted
ACII
2005
Springer
15 years 7 months ago
Intelligent Expressions of Emotions
We propose an architecture of an embodied conversational agent that takes into account two aspects of emotions: the emotions triggered by an event (the felt emotions) and the expre...
Magalie Ochs, Radoslaw Niewiadomski, Catherine Pel...
ATAL
2009
Springer
15 years 8 months ago
Computing optimal randomized resource allocations for massive security games
Predictable allocations of security resources such as police officers, canine units, or checkpoints are vulnerable to exploitation by attackers. Recent work has applied game-theo...
Christopher Kiekintveld, Manish Jain, Jason Tsai, ...