Sciweavers

1028 search results - page 69 / 103
» Using Attack Graphs to Design Systems
Sort
View
239 views 132 votes 15 years 6 months ago  HYBRID 2010»
This paper addresses the problem of self localization of mobile devices. In particular, each device combines noisy measurements of its absolute position with distance measurements...
104 views 83 votes 15 years 7 months ago  CIMCA 2006»
Abstract. We describe Scusi?, a multi-stage, spoken language interpretation mechanism designed to be part of a robot-mounted dialogue system. Scusi?’s interpretation process maps...
191 views 134 votes 14 years 1 months ago  CRYPTO 2011»
Strong lattice reduction is the key element for most attacks against lattice-based cryptosystems. Between the strongest but impractical HKZ reduction and the weak but fast LLL redu...
147 views 105 votes 15 years 1 months ago  IJSN 2008»
: Firewalls have been designed as a major component to protect a network or a server from being attacked. However, due to their emphasis on packet filtering rather than verifying u...
121 views 89 votes 15 years 5 months ago  DEBS 2007»
Event-driven systems are used in a wide range of applications such as responding to missile attacks, interdicting potential terrorists, exploiting arbitrage opportunities and resp...
112 views 100 votes 15 years 4 months ago  ITS 2000»
We developed a distributed support model in an interface for distant learning. The support is integrated into the ExploraGraph navigator which makes it possible to navigate through...
118 views 174 votes 16 years 1 months ago  SIGMOD 2008»
Freebase is a practical, scalable tuple database used to structure general human knowledge. The data in Freebase is collaboratively created, structured, and maintained. Freebase c...
129 views 105 votes 15 years 7 months ago  MSS 2007»
Storage systems are increasingly subject to attacks. Cryptographic file systems mitigate the danger of exposing data by using encryption and integrity protection methods and guar...
163 views 119 votes 15 years 8 months ago  ESORICS 2009»
Abstract. The design and implementation of security threat mitigation mechanisms in RFID systems, specially in low-cost RFID tags, are gaining great attention in both industry and ...
141 views 107 votes 15 years 4 months ago  HHCI 2000»
In this paper we discuss the design of computer-based haptic graphs for blind and visually impaired people with the support of our preliminary experimental results. Since visual i...