Sciweavers

1521 search results - page 24 / 305
» The Evolution of Information Assurance
Sort
View
ESOP
2010
Springer
15 years 6 months ago
Precise and Automated Contract-based Reasoning for Verification and Certification of Information Flow Properties of Programs wit
Abstract. Embedded information assurance applications that are critical to national and international infrastructures, must often adhere to certification regimes that require infor...
Torben Amtoft, John Hatcliff and Edwin Rodríguez
HICSS
2003
IEEE
139views Biometrics» more  HICSS 2003»
15 years 2 months ago
Modeling of information dominance in complex systems: A system partitioning and hybrid control framework
This paper1 provides a view of modeling the information dominance problem of military systems as representative of modeling other complex systems. The ideas are an extension of ea...
John R. James
70
Voted
IPCCC
2007
IEEE
15 years 3 months ago
ACM: A Transmission Mechanism for Urgent Sensor Information
The wireless sensor network (WSN) is one of the most promising technologies which helps making our society safe, secure, and comfortable. A WSN as a social infrastructure must tra...
Tetsuya Kawai, Naoki Wakamiya, Masayuki Murata
105
Voted
CLEF
2011
Springer
13 years 9 months ago
The Encoplot Similarity Measure for Automatic Detection of Plagiarism - Notebook for PAN at CLEF 2011
Abstract This paper describes the evolution of our method Encoplot for automatic plagiarism detection and the results of the participation to the PAN’11
Cristian Grozea, Marius Popescu
WOWMOM
2005
ACM
86views Multimedia» more  WOWMOM 2005»
15 years 3 months ago
The Wireless Opaque Channel to Contrast Information Leakage
Widespread adoption of wireless devices has considerably enlarged the domain of user applications, but consequently specific issues related to a secure use of these devices arise...
Marco Domenico Aime, Andrea S. Atzeni, Antonio Lio...