Sciweavers

5 search results - page 1 / 1
» Mitigating Issues Related to the Modeling of Insurgent Recru...
Sort
View
SBP
2010
Springer
13 years 4 months ago
Mitigating Issues Related to the Modeling of Insurgent Recruitment
Modeling the specific motivations and influences related to an individual‘s decision to become involved in insurgent warfare presents its own collection of unique challenges. The...
Erica Briscoe, Ethan Trewhitt, Lora Weiss, Elizabe...
BDIM
2007
IEEE
99views Business» more  BDIM 2007»
14 years 18 days ago
Model-Based Mitigation of Availability Risks
The assessment and mitigation of risks related to the availability of the IT infrastructure is becoming increasingly important in modern organizations. Unfortunately, present stan...
Emmanuele Zambon, Damiano Bolzoni, Sandro Etalle, ...
CRYPTO
2006
Springer
124views Cryptology» more  CRYPTO 2006»
13 years 10 months ago
Mitigating Dictionary Attacks on Password-Protected Local Storage
We address the issue of encrypting data in local storage using a key that is derived from the user's password. The typical solution in use today is to derive the key from the...
Ran Canetti, Shai Halevi, Michael Steiner
PERCOM
2006
ACM
14 years 5 months ago
Balancing Autonomy and User Control in Context-Aware Systems - a Survey
Application autonomy can reduce interactions with users, ease the use of the system, and decrease user distraction. On the other hand, users may feel loss of control over their ap...
Bob Hardian, Jadwiga Indulska, Karen Henricksen
FUIN
2008
119views more  FUIN 2008»
13 years 6 months ago
Modeling Communication with Synchronized Environments
A deterministic behavior of systems composed of several modules is a desirable design goal. Assembling a complex system from components requires also a high degree of re-usability....
Tiberiu Seceleanu, Axel Jantsch