Sciweavers

2030 search results - page 31 / 406
» The Need for Customizable Operating Systems
Sort
View
IACR
2011
89views more  IACR 2011»
14 years 3 months ago
Identity-Based Decryption
Identity-based decryption is an alternative to identity-based encryption, in which Alice encrypts a symmetric key for Bob under a trusted authority’s public key. Alice sends Bob...
Daniel R. L. Brown
IEEEIAS
2008
IEEE
15 years 10 months ago
Operator-Centric and Adaptive Intrusion Detection
: An intrusion detection system should support the operator of the system. Thus, in addition to producing alerts, it should allow for easy insertion of new detection algorithms. It...
Ulf Larson, Stefan Lindskog, Dennis K. Nilsson, Er...
244
Voted
SIGMOD
2005
ACM
220views Database» more  SIGMOD 2005»
16 years 4 months ago
Sampling Algorithms in a Stream Operator
Complex queries over high speed data streams often need to rely on approximations to keep up with their input. The research community has developed a rich literature on approximat...
Theodore Johnson, S. Muthukrishnan, Irina Rozenbau...
IROS
2009
IEEE
176views Robotics» more  IROS 2009»
15 years 10 months ago
Improving unmanned aerial vehicle pilot training and operation for flying in cluttered environments
— Future applications will bring unmanned aerial vehicles (UAVs) to new environments such as urban areas, causing a change in the way that UAVs are currently operated. However, U...
James T. Hing, Keith W. Sevcik, Paul Y. Oh
WOA
2004
15 years 5 months ago
A Game-Theoretic Operational Semantics
Abstract-- In this paper we present the communication architecture of the DALI Logic Programming Agent-Oriented language and we discuss its semantics. We have designed a meta-level...
Arianna Tocchio, Stefania Costantini, Alessia Vert...