Sciweavers

6907 search results - page 196 / 1382
» Securing distributed adaptation
Sort
View
CCS
2004
ACM
15 years 8 months ago
Lessons learned using alloy to formally specify MLS-PCA trusted security architecture
In order to solve future Multi Level Security (MLS) problems, we have developed a solution based on the DARPA Polymorphous Computing Architecture (PCA). MLS-PCA uses a novel distr...
Brant Hashii
GCC
2004
Springer
15 years 8 months ago
A Software Engineering Perspective for Services Security
Services are usually developed and deployed independently; and systems can be formed by composing relevant services to achieve set goals. In such an open and dynamic environment, s...
Jun Han
TIFS
2008
133views more  TIFS 2008»
15 years 3 months ago
Kerckhoffs-Based Embedding Security Classes for WOA Data Hiding
Abstract-- It has recently been discovered that using pseudorandom sequences as carriers in spread-spectrum techniques for data-hiding is not at all a sufficient condition for ensu...
François Cayre, Patrick Bas
SAFECOMP
2005
Springer
15 years 8 months ago
Are High-Level Languages Suitable for Robust Telecoms Software?
In the telecommunications sector product development must minimise time to market while delivering high levels of dependability, availability, maintainability and scalability. High...
Jan Henry Nyström, Philip W. Trinder, David J...
ICASSP
2008
IEEE
15 years 9 months ago
Blind source separation in a distributed microphone meeting environment for improved teleconferencing
From an audio perspective, the present state of teleconferencing technology leaves something to be desired; speaker overlap is one of the causes of this inadequate performance. To...
Jacek P. Dmochowski, Zicheng Liu, Philip A. Chou