Sciweavers

14824 search results - page 2583 / 2965
» Security - Introduction
Sort
View
124
Voted
ATAL
2005
Springer
15 years 9 months ago
The use of emotions to create believable agents in a virtual environment
In the past emotions have been dismissed as a distraction to the logical, scientific thought process. More recently however, the importance of emotion in human-like intelligence a...
Karthi Selvarajah, Debbie Richards
127
Voted
BTW
2005
Springer
80views Database» more  BTW 2005»
15 years 9 months ago
Measuring the Quality of Approximated Clusterings
Abstract. Clustering has become an increasingly important task in modern application domains. In many areas, e.g. when clustering complex objects, in distributed clustering, or whe...
Hans-Peter Kriegel, Martin Pfeifle
124
Voted
CASSIS
2005
Springer
15 years 9 months ago
Information Flow Analysis for a Typed Assembly Language with Polymorphic Stacks
Abstract. We study secure information flow in a stack based Typed Assembly Language (TAL). We define a TAL with an execution stack and establish the soundness of its type system ...
Eduardo Bonelli, Adriana B. Compagnoni, Ricardo Me...
101
Voted
CEAS
2005
Springer
15 years 9 months ago
Accredited DomainKeys: A Service Architecture for Improved Email Validation
We present an architecture called Accredited DomainKeys, which builds on the DomainKeys email authentication infrastructure to address the following questions: • “Did the send...
Michael T. Goodrich, Roberto Tamassia, Danfeng Yao
150
Voted
CHES
2005
Springer
281views Cryptology» more  CHES 2005»
15 years 9 months ago
Data Remanence in Flash Memory Devices
Data remanence is the residual physical representation of data that has been erased or overwritten. In non-volatile programmable devices, such as UV EPROM, EEPROM or Flash, bits ar...
Sergei P. Skorobogatov
« Prev « First page 2583 / 2965 Last » Next »