Sciweavers

2979 search results - page 444 / 596
» Modelling secure multiagent systems
Sort
View
124
Voted
CCS
2007
ACM
15 years 10 months ago
Fuzzy extractors for continuous distributions
We show that there is a direct relation between the maximum length of the keys extracted from biometric data and the error rates of the biometric system. The length of the bio-key...
Ileana Buhan, Jeroen Doumen, Pieter H. Hartel, Ray...
128
Voted
OOPSLA
2007
Springer
15 years 9 months ago
Democratizing the cloud
Programming distributed data-intensive web and mobile applications is gratuitously hard. As the world is moving more and more towards the software as services model, we have to co...
Erik Meijer
103
Voted
CCS
2007
ACM
15 years 7 months ago
Efficient techniques for realizing geo-spatial access control
The problem of key management for access control systems has been well-studied, and the literature contains several schemes for hierarchy-based and temporal-based access control. ...
Mikhail J. Atallah, Marina Blanton, Keith B. Frikk...
113
Voted
ISSE
2010
15 years 2 months ago
A second look at Faster, Better, Cheaper
“Faster, Better, Cheaper” (FBC) was a systems development methodology used by NASA in the 1990s. While usually a deprecated practice, we find that, with certain caveats, it is...
Oussama El-Rawas, Tim Menzies
135
Voted
ITSL
2008
15 years 5 months ago
A Randomized Complexity-theoretic Model of Bio-inspired Mobile Epidemics via Close Contact
In this paper we present a randomized complexity theoretic model for those epidemics propagated via short-distance close contact. We prove that the contact-based epidemics problems...
Zhen Cao, Jiejun Kong, Mario Gerla, Dapeng Wu