Sciweavers

1521 search results - page 115 / 305
» Role analysis
Sort
View
CTRSA
2005
Springer
210views Cryptology» more  CTRSA 2005»
15 years 5 months ago
Hold Your Sessions: An Attack on Java Session-Id Generation
HTTP session-id’s take an important role in almost any web site today. This paper presents a cryptanalysis of Java Servlet 128-bit session-id’s and an efficient practical predi...
Zvi Gutterman, Dahlia Malkhi
AIME
2003
Springer
15 years 5 months ago
Bodily Systems and the Modular Structure of the Human Body
Medical science conceives the human body as a system comprised of many subsystems at a variety of levels. At the highest level are bodily systems proper, such as the endocrine syst...
Barry Smith, Igor Papakin, Katherine Munn
IBPRIA
2003
Springer
15 years 5 months ago
Bayesian Image Estimation from an Incomplete Set of Blurred, Undersampled Low Resolution Images
Abstract. This paper deals with the problem of reconstructing a highresolution image from an incomplete set of undersampled, blurred and noisy images shifted with subpixel displace...
Javier Mateos, Miguel Vega, Rafael Molina, Aggelos...
ISNN
2010
Springer
15 years 4 months ago
Learning to Believe by Feeling: An Agent Model for an Emergent Effect of Feelings on Beliefs
An agent's beliefs usually depend on cognitive factors, but also affective factors may play a role. This paper presents an agent model that shows how such affective effects on...
Zulfiqar A. Memon, Jan Treur
ISCC
2000
IEEE
125views Communications» more  ISCC 2000»
15 years 4 months ago
Security Requirements for Management Systems Using Mobile Agents
Flexible and distributed management systems based on mobile agents have certain advantages over centralized and static management architectures. However, security plays a decisive...
Helmut Reiser, Gerald Vogt