Sciweavers

1737 search results - page 79 / 348
» Using Strategy Objectives for Network Security Analysis
Sort
View
ASIAN
2009
Springer
269views Algorithms» more  ASIAN 2009»
14 years 9 months ago
Noninterference with Dynamic Security Domains and Policies
Abstract. Language-based information flow analysis is used to statically examine a program for information flows between objects of different security domains, and to verify these ...
Robert Grabowski, Lennart Beringer
PCM
2001
Springer
130views Multimedia» more  PCM 2001»
15 years 4 months ago
Data Encryption Using MRF with an RSA Key
In a digital multimedia era, the security of multimedia over network transmission becomes a challenging issue. A strategy, combining cryptography with steganography, is investigat...
Chaur-Chin Chen
ICASSP
2011
IEEE
14 years 3 months ago
A comparative analysis of dynamic network decoding
The use of statically compiled search networks for ASR systems using huge vocabularies and complex language models often becomes challenging in terms of memory requirements. Dynam...
David Rybach, Ralf Schlüter, Hermann Ney
ATAL
2006
Springer
15 years 3 months ago
Evolutionary Stability of Behavioural Types in the Continuous Double Auction
In this paper, we investigate the effectiveness of different types of bidding behaviour for trading agents in the Continuous Double Auction (CDA). Specifically, we consider behavi...
Perukrishnen Vytelingum, Dave Cliff, Nicholas R. J...
LCN
2006
IEEE
15 years 5 months ago
Practical Evaluation of the Performance Impact of Security Mechanisms in Sensor Networks
Security has become a major concern for many realworld applications for wireless sensor networks (WSN). In this domain, many security solutions have been proposed. Usually, all th...
Martin Passing, Falko Dressler