Sciweavers

1737 search results - page 88 / 348
» Using Strategy Objectives for Network Security Analysis
Sort
View
FLAIRS
2001
15 years 1 months ago
Time Series Analysis Using Unsupervised Construction of Hierarchical Classifiers
Recently we have proposed an algorithm of constructing hierarchical neural network classifiers (HNNC), that is based on a modification of error back-propagation. This algorithm co...
S. A. Dolenko, Yu. V. Orlov, I. G. Persiantsev, Ju...
122
Voted
JSAC
2006
167views more  JSAC 2006»
14 years 12 months ago
Secure and resilient clock synchronization in wireless sensor networks
Abstract--Wireless sensor networks have received a lot of attention recently due to its wide applications. An accurate and synchronized clock time is crucial in many sensor network...
Kun Sun, Peng Ning, Cliff Wang
NSDI
2008
15 years 2 months ago
Passport: Secure and Adoptable Source Authentication
We present the design and evaluation of Passport, a system that allows source addresses to be validated within the network. Passport uses efficient, symmetric-key cryptography to ...
Xin Liu, Ang Li, Xiaowei Yang, David Wetherall
LREC
2008
139views Education» more  LREC 2008»
15 years 1 months ago
Automatic Learning and Evaluation of User-Centered Objective Functions for Dialogue System Optimisation
The ultimate goal when building dialogue systems is to satisfy the needs of real users, but quality assurance for dialogue strategies is a non-trivial problem. The applied evaluat...
Verena Rieser, Oliver Lemon
CCS
2008
ACM
15 years 1 months ago
On the protocol composition logic PCL
A recent development in formal security protocol analysis is the Protocol Composition Logic (PCL). We identify a number of problems with this logic as well as with extensions of t...
Cas J. F. Cremers