Sciweavers

1521 search results - page 119 / 305
» Role analysis
Sort
View
CAU
2004
192views Cryptology» more  CAU 2004»
15 years 1 months ago
Encrypted? Randomised? Compromised? (When Cryptographically Secured Data is Not Secure)
Protecting data is not simply a case of encrypt and forget: even data with full cryptographic confidentiality and integrity protection can still be subject to information leakage. ...
Mike Bond, Jolyon Clulow
WSC
2007
15 years 2 months ago
Importance sampling of compounding processes
Compounding processes, also known as perpetuities, play an important role in many applications; in particular, in time series analysis and mathematical finance. Apart from some s...
Jose Blanchet, Bert Zwart
CAV
2009
Springer
176views Hardware» more  CAV 2009»
16 years 9 days ago
PAT: Towards Flexible Verification under Fairness
Recent development on distributed systems has shown that a variety of fairness constraints (some of which are only recently defined) play vital roles in designing self-stabilizing ...
Jun Sun 0001, Yang Liu 0003, Jin Song Dong, Jun Pa...
AAAI
2006
15 years 1 months ago
Factored Planning: How, When, and When Not
Automated domain factoring, and planning methods that utilize them, have long been of interest to planning researchers. Recent work in this area yielded new theoretical insight an...
Ronen I. Brafman, Carmel Domshlak
ISNN
2005
Springer
15 years 5 months ago
ICA and Committee Machine-Based Algorithm for Cursor Control in a BCI System
In recent years, brain-computer interface (BCI) technology has emerged very rapidly. Brain-computer interfaces (BCIs) bring us a new communication interface technology which can tr...
Jianzhao Qin, Yuanqing Li, Andrzej Cichocki