Sciweavers

5326 search results - page 36 / 1066
» On what we can ensure
Sort
View
75
Voted
SP
2006
IEEE
15 years 6 months ago
Deterring Voluntary Trace Disclosure in Re-encryption Mix Networks
An all too real threat to the privacy offered by a mix network is that individual mix administrators may volunteer partial tracing information to a coercer. While this threat can ...
Philippe Golle, XiaoFeng Wang, Markus Jakobsson, A...
79
Voted
TISSEC
2010
72views more  TISSEC 2010»
14 years 11 months ago
Deterring voluntary trace disclosure in re-encryption mix-networks
An all too real threat to the privacy offered by a mix network is that individual mix administrators may volunteer partial tracing information to a coercer. While this threat can ...
XiaoFeng Wang, Philippe Golle, Markus Jakobsson, A...
108
Voted
NOMS
2000
IEEE
15 years 5 months ago
Failure semantics of mobile agent systems involved in network fault management
Recently mobile agent technology has been recognised as a potential tool for realising distributed network fault management. The autonomy and mobility of such agents can help ensu...
Otto Wittner, Bjarne E. Helvik, C. J. E. Holper
ICGI
2010
Springer
14 years 11 months ago
Rademacher Complexity and Grammar Induction Algorithms: What It May (Not) Tell Us
Abstract. This paper revisits a problem of the evaluation of computational grammatical inference (GI) systems and discusses what role complexity measures can play for the assessmen...
Sophia Katrenko, Menno van Zaanen
100
Voted
KBSE
2002
IEEE
15 years 5 months ago
What Makes Finite-State Models More (or Less) Testable?
Finite-state machine (FSM) models are commonly used to represent software with concurrent processes. Established model checking tools can be used to automatically test FSM models,...
David Owen, Tim Menzies, Bojan Cukic