Sciweavers

5475 search results - page 1065 / 1095
» Model Driven Security
Sort
View
120
Voted
ATAL
2010
Springer
15 years 1 months ago
Path disruption games
We propose Path Disruption Games (PDGs), which consider collaboration between agents attempting stop an adversary from travelling from a source node to a target node in a graph. P...
Yoram Bachrach, Ely Porat
104
Voted
CRYPTO
2010
Springer
171views Cryptology» more  CRYPTO 2010»
15 years 1 months ago
Credential Authenticated Identification and Key Exchange
Secure two-party authentication and key exchange are fundamental problems. Traditionally, the parties authenticate each other by means of their identities, using a public-key infr...
Jan Camenisch, Nathalie Casati, Thomas Groß,...
GECCO
2008
Springer
179views Optimization» more  GECCO 2008»
15 years 1 months ago
Emergent architecture in self organized swarm systems for military applications
Many sectors of the military are interested in Self-Organized (SO) systems because of their flexibility, versatility and economics. The military is researching and employing auto...
Dustin J. Nowak, Gary B. Lamont, Gilbert L. Peters...
116
Voted
TKDE
2008
134views more  TKDE 2008»
15 years 11 days ago
Sensor-Based Abnormal Human-Activity Detection
With the availability of affordable sensors and sensor networks, sensor-based human-activity recognition has attracted much attention in artificial intelligence and ubiquitous comp...
Jie Yin, Qiang Yang, Jeffrey Junfeng Pan
95
Voted
COMGEO
1999
ACM
15 years 4 days ago
Visualizing geometric algorithms over the Web
The visual nature of geometry applications makes them a natural area where visualization can be an effective tool for demonstrating algorithms. In this paper we propose a new mode...
James E. Baker, Isabel F. Cruz, Giuseppe Liotta, R...
« Prev « First page 1065 / 1095 Last » Next »