Sciweavers

637 search results - page 69 / 128
» The Case for Abstracting Security Policies
Sort
View
FSTTCS
2009
Springer
15 years 8 months ago
Non-Local Box Complexity and Secure Function Evaluation
ABSTRACT. A non-local box is an abstract device into which Alice and Bob input bits x and y respectively and receive outputs a and b respectively, where a, b are uniformly distribu...
Marc Kaplan, Iordanis Kerenidis, Sophie Laplante, ...
RTSS
2005
IEEE
15 years 7 months ago
Energy-Aware Modeling and Scheduling of Real-Time Tasks for Dynamic Voltage Scaling
Abstract— Dynamic voltage scaling (DVS) is a promising technique for battery-powered systems to conserve energy consumption. Most existing DVS algorithms assume information about...
Xiliang Zhong, Cheng-Zhong Xu
ITRUST
2005
Springer
15 years 7 months ago
Security and Trust in the Italian Legal Digital Signature Framework
Abstract. The early adoption of a national, legal digital signature framework in Italy has brought forth a series of problems and vulnerabilities. In this paper we describe each of...
Stefano Zanero
OTM
2004
Springer
15 years 7 months ago
Engineering an Ontology of Financial Securities Fraud
Abstract. This paper discusses the approach of ontology-based knowledge engineering in FF POIROT, a project to explore the use of ontology technology in information systems against...
Gang Zhao, John Kingston, Koen Kerremans, Frederic...
INFOCOM
2000
IEEE
15 years 6 months ago
Optimal Streaming of Layered Video
Abstract—This paper presents a model and theory for streaming layered video. We model the bandwidth available to the streaming application as a stochastic process whose statistic...
Despina Saparilla, Keith W. Ross