Sciweavers

1875 search results - page 241 / 375
» Modeling the Security of Steganographic Systems
Sort
View
IEEEARES
2008
IEEE
15 years 7 months ago
Making Multi-Dimensional Trust Decisions on Inter-Enterprise Collaborations
—Enterprise computing is moving towards more open, collaborative systems. Joining a business network must be made efficient, despite the technical and semantic interoperability ...
Sini Ruohomaa, Lea Kutvonen
92
Voted
CSFW
2007
IEEE
15 years 6 months ago
Collaborative Planning With Privacy
Collaboration among organizations or individuals is common. While these participants are often unwilling to share all their information with each other, some information sharing i...
Max I. Kanovich, Paul Rowe, Andre Scedrov
96
Voted
CCS
2007
ACM
15 years 6 months ago
Fuzzy extractors for continuous distributions
We show that there is a direct relation between the maximum length of the keys extracted from biometric data and the error rates of the biometric system. The length of the bio-key...
Ileana Buhan, Jeroen Doumen, Pieter H. Hartel, Ray...
96
Voted
OOPSLA
2007
Springer
15 years 6 months ago
Democratizing the cloud
Programming distributed data-intensive web and mobile applications is gratuitously hard. As the world is moving more and more towards the software as services model, we have to co...
Erik Meijer
AGENTS
1999
Springer
15 years 4 months ago
The UMASS Intelligent Home Project
Intelligent environmentsareaninterestingdevelopmentandresearchapplication problem for multi-agent systems.The functionalandspatialdistribution of tasksnaturally lendsitself to a m...
Victor R. Lesser, Michael Atighetchi, Brett Benyo,...