Sciweavers

14190 search results - page 209 / 2838
» computer 2008
Sort
View
148
Voted
WICSA
2007
15 years 6 months ago
Architecting Pervasive Computing Systems for Privacy: A Survey
In pervasive computing systems, a higher number of interactions will be mediated by computers, amplifying the menace to privacy. Privacy protection in pervasive environments is st...
Roberto Speicys Cardoso, Valérie Issarny
ANOR
2008
127views more  ANOR 2008»
15 years 5 months ago
Computer science and decision theory
This paper reviews applications in computer science that decision theorists have addressed for years, discusses the requirements posed by these applications that place great strai...
Fred S. Roberts
TCS
2008
15 years 4 months ago
Sound and complete computational interpretation of symbolic hashes in the standard model
This paper provides one more step towards bridging the gap between the formal and computational approaches to the verification of cryptographic protocols. We extend the well-known ...
Flavio D. Garcia, Peter van Rossum
137
Voted
UAI
2008
15 years 6 months ago
The Computational Complexity of Sensitivity Analysis and Parameter Tuning
While known algorithms for sensitivity analysis and parameter tuning in probabilistic networks have a running time that is exponential in the size of the network, the exact comput...
Johan Kwisthout, Linda C. van der Gaag
177
Voted
ISSA
2004
15 years 6 months ago
An Investigation Into Computer Forensic Tools
Cyber-crime has reached unprecedented proportions in this day and age. In addition, the internet has created a world with seemingly no barriers while making a countless number of ...
K. K. Arthur