Sciweavers

2486 search results - page 107 / 498
» A Type System for Computationally Secure Information Flow
Sort
View
AINA
2006
IEEE
14 years 2 months ago
Efficacy of Coordinated Distributed Multiple Attacks (A Proactive Approach to Cyber Defense)
In the network-centric approach to information operations, users share information robustly by means of a secure infrastructure that enables self-synchronization and, ultimately, ...
Patrick Defibaugh-Chavez, Srinivas Mukkamala, Andr...
ICIP
2007
IEEE
14 years 10 months ago
Video Segmentation and Semantics Extraction from the Fusion of Motion and Color Information
In recent years, digital multimedia technologies have evolved significantly, and are finding numerous applications, over the internet, and even over mobile networks. Thus, the vid...
Alexia Briassouli, Vasileios Mezaris, Ioannis Komp...
VISUALIZATION
2005
IEEE
14 years 2 months ago
Illustration and Photography Inspired Visualization of Flows and Volumes
Understanding and analyzing complex volumetrically varying data is a difficult problem. Many computational visualization techniques have had only limited success in succinctly po...
Nikolai A. Svakhine, Yun Jang, David S. Ebert, Kel...
CCS
2006
ACM
14 years 18 days ago
Secure attribute-based systems
Attributes define, classify, or annotate the datum to which they are assigned. However, traditional attribute architectures and cryptosystems are ill-equipped to provide security ...
Matthew Pirretti, Patrick Traynor, Patrick McDanie...
ICEIS
2007
IEEE
13 years 10 months ago
An information systems auditor's profile
The increasing dependence upon Information systems in the last few decades by businesses has resulted in concerns regarding auditing. IS auditing has changed from auditing “arou...
Mariana Carroll, Alta van der Merwe