Sciweavers

1599 search results - page 245 / 320
» Program Analysis for Security and Privacy
Sort
View
AGENTS
1999
Springer
15 years 4 months ago
On Being a Teammate: Experiences Acquired in the design of RoboCup Teams
Increasingly, multi-agent systems are being designed for a variety of complex, dynamic domains. E ective agent interactions in such domains raise some of most fundamental research...
Stacy Marsella, Jafar Adibi, Yaser Al-Onaizan, Gal...
SP
1997
IEEE
163views Security Privacy» more  SP 1997»
15 years 4 months ago
Anonymous Connections and Onion Routing
Onion Routing is an infrastructure for private communication over a public network. It provides anonymous connections that are strongly resistant to both eavesdropping and tra c a...
Paul F. Syverson, David M. Goldschlag, Michael G. ...
AGENTS
1997
Springer
15 years 4 months ago
An Adaptive Web Page Recommendation Service
An adaptive recommendation service seeks to adapt to its users, providing increasingly personalized recommendations over time. In this paper we introduce the \Fab" adaptive W...
Marko Balabanovic
ESORICS
1994
Springer
15 years 4 months ago
On the Expressive Power of the Unary Transformation Model
The Transformation Model TRM was recently introduced 10 in the literature by Sandhu and Ganta. TRM is based on the concept of transformation of rights. The propagation of access ri...
Ravi S. Sandhu, Srinivas Ganta
CCS
2009
ACM
15 years 3 months ago
On voting machine design for verification and testability
We present an approach for the design and analysis of an electronic voting machine based on a novel combination of formal verification and systematic testing. The system was desig...
Cynthia Sturton, Susmit Jha, Sanjit A. Seshia, Dav...