Sciweavers

5639 search results - page 797 / 1128
» Timed Abstract Non-interference
Sort
View
OTM
2007
Springer
15 years 11 months ago
Towards Community-Based Evolution of Knowledge-Intensive Systems
Abstract. This article wants to address the need for a research effort and framework that studies and embraces the novel, difficult but crucial issues of adaptation of knowledge r...
Pieter De Leenheer, Robert Meersman
PAM
2007
Springer
15 years 11 months ago
Measures of Self-similarity of BGP Updates and Implications for Securing BGP
Abstract. Techniques for authenticating BGP protocol objects entail the inspection of additional information in the form of authentication credentials that can be used to validate ...
Geoff Huston
PDCAT
2007
Springer
15 years 11 months ago
Two Tree-Based Algorithms for Network Spare Capacity Design
Abstract. Survivable network design has become increasingly important due to the need for reliable communication service. Its main purpose is to provide cost-efficient spare capaci...
Hovhannes A. Harutyunyan, Calin D. Morosan, Yunzan...
PKC
2007
Springer
144views Cryptology» more  PKC 2007»
15 years 11 months ago
Traceable Ring Signature
Abstract. The ring signature allows a signer to leak secrets anonymously, without the risk of identity escrow. At the same time, the ring signature provides great flexibility: No ...
Eiichiro Fujisaki, Koutarou Suzuki
PREMI
2007
Springer
15 years 11 months ago
An Adaptive Bayesian Technique for Tracking Multiple Objects
Abstract. Robust tracking of objects in video is a key challenge in computer vision with applications in automated surveillance, video indexing, human-computer-interaction, gesture...
Pankaj Kumar, Michael J. Brooks, Anton van den Hen...