Sciweavers

1140 search results - page 159 / 228
» A Purpose-Based Access Control Model
Sort
View
24
Voted
DSD
2002
IEEE
146views Hardware» more  DSD 2002»
14 years 25 days ago
Configurable Memory Organisation for Communication Applications
A configurable memory organisation for the execution of Hiperlan/2 transceiver baseband processing and MPEG2 decoding is presented. The configuration of the memory system is done ...
Juha-Pekka Soininen, Antti Pelkonen, Jussi Roivain...
ICARCV
2002
IEEE
185views Robotics» more  ICARCV 2002»
14 years 25 days ago
Evolving cooperative robotic behaviour using distributed genetic programming
Cooperative robotic systems provide design and implementation challenges that are not easy to solve. This paper describes a parallel implementation for evolving cooperative roboti...
Chris H. Messom, Matthew G. Walker
ACSAC
2004
IEEE
13 years 11 months ago
Designing Good Deceptions in Defense of Information Systems
Since attackers trust computer systems to tell them the truth, it may be effective for those systems to lie or mislead. This could waste the attacker's resources while permit...
Neil C. Rowe
WSC
2007
13 years 10 months ago
Simulation of time to first water application for the First Interstate Bank fire
On May 4, 1988 a fire occurred after hours on the 12th floor of the First Interstate Bank building, a 62 story steelframe office tower in Los Angeles California. The sprinkler sys...
Robert Till
FSE
2008
Springer
110views Cryptology» more  FSE 2008»
13 years 9 months ago
How to Encrypt with a Malicious Random Number Generator
Chosen-plaintext attacks on private-key encryption schemes are currently modeled by giving an adversary access to an oracle that encrypts a given message m using random coins that ...
Seny Kamara, Jonathan Katz