Sciweavers

4511 search results - page 19 / 903
» Observation Based System Security
Sort
View
146
Voted
CODES
2005
IEEE
15 years 7 months ago
Enhancing security through hardware-assisted run-time validation of program data properties
The growing number of information security breaches in electronic and computing systems calls for new design paradigms that consider security as a primary design objective. This i...
Divya Arora, Anand Raghunathan, Srivaths Ravi, Nir...
96
Voted
ACSAC
2006
IEEE
15 years 8 months ago
Protecting Privacy in Key-Value Search Systems
This paper investigates the general problem of performing key-value search at untrusted servers without loss of user privacy. Specifically, given key-value pairs from multiple ow...
Yinglian Xie, Michael K. Reiter, David R. O'Hallar...
SIAMSC
2010
120views more  SIAMSC 2010»
15 years 7 days ago
Simultaneously Sparse Solutions to Linear Inverse Problems with Multiple System Matrices and a Single Observation Vector
Abstract. A problem that arises in slice-selective magnetic resonance imaging (MRI) radiofrequency (RF) excitation pulse design is abstracted as a novel linear inverse problem with...
Adam C. Zelinski, Vivek K. Goyal, Elfar Adalsteins...
INFORMATICALT
2010
122views more  INFORMATICALT 2010»
15 years 9 days ago
On a Time-Varying Parameter Adaptive Self-Organizing System in the Presence of Large Outliers in Observations
In the previous papers (Pupeikis, 2000; Genov et al., 2006; Atanasov and Pupeikis, 2009), a direct approach for estimating the parameters of a discrete-time linear time-invariant (...
Rimantas Pupeikis
111
Voted
CCS
2000
ACM
15 years 6 months ago
Security enhanced mobile agents
This paper describes a security model for mobile agent based systems. The model defines the notion of a security-enhanced agent and outlines security management components in agen...
Vijay Varadharajan