Sciweavers

2043 search results - page 152 / 409
» Reasoning About Security Models
Sort
View
107
Voted
AAAI
2008
15 years 3 months ago
Factored Models for Probabilistic Modal Logic
Modal logic represents knowledge that agents have about other agents' knowledge. Probabilistic modal logic further captures probabilistic beliefs about probabilistic beliefs....
Afsaneh Shirazi, Eyal Amir
101
Voted
CSFW
2005
IEEE
15 years 6 months ago
End-to-End Availability Policies and Noninterference
This paper introduces the use of static information flow analysis for the specification and enforcement of end-toend availability policies in programs. We generalize the decentr...
Lantian Zheng, Andrew C. Myers
113
Voted
SIGCOMM
2010
ACM
15 years 1 months ago
Fived: a service-based architecture implementation to innovate at the endpoints
Security functions such as access control, encryption and authentication are typically left up to applications on the modern Internet. There is no unified system to implement thes...
D. J. Capelis, Darrell D. E. Long
103
Voted
FLAIRS
2000
15 years 2 months ago
Fundamental Properties of the Core Matching Functions for Information Retrieval
Traditional benchmarking methods for information retrieval (IR) are based on experimental performance evaluation. Although the metrics precision and recall can measure the perform...
Dawei Song, Kam-Fai Wong, Peter Bruza, Chun Hung C...
128
Voted
ESSLLI
2009
Springer
14 years 10 months ago
A Salience-Driven Approach to Speech Recognition for Human-Robot Interaction
We present an implemented model for speech recognition in natural environments which relies on contextual information about salient entities to prime utterance recognition. The hyp...
Pierre Lison