Sciweavers

361 search results - page 40 / 73
» A Vector Model of Trust for Developing Trustworthy Systems
Sort
View
MLMI
2005
Springer
14 years 2 months ago
Generic Dialogue Modeling for Multi-application Dialogue Systems
We present a novel approach to developing interfaces for multi-application dialogue systems. The targeted interfaces allow transparent switching between a large number of applicati...
Trung H. Bui, Job Zwiers, Anton Nijholt, Mannes Po...
ICISC
2001
156views Cryptology» more  ICISC 2001»
13 years 10 months ago
A Distributed Light-Weight Authentication Model for Ad-hoc Networks
Abstract. In this work we present a security model for low-value transactions in ad-hoc networks in which we focus on authentication since this is the core requirement for commerci...
André Weimerskirch, Gilles Thonet
SP
1996
IEEE
140views Security Privacy» more  SP 1996»
14 years 24 days ago
A Security Model of Dynamic Labeling Providing a Tiered Approach to Verification
In the proposed mandatory access control model, arbitrary label changing policies can be expressed. The relatively simple model can capture a wide variety of security policies, in...
Simon N. Foley, Li Gong, Xiaolei Qian
ICTIR
2009
Springer
14 years 3 months ago
PageRank: Splitting Homogeneous Singular Linear Systems of Index One
Abstract. The PageRank algorithm is used today within web information retrieval to provide a content-neutral ranking metric over web pages. It employs power method iterations to so...
Douglas V. de Jager, Jeremy T. Bradley
ECOOP
2005
Springer
14 years 2 months ago
Interprocedural Analysis for Privileged Code Placement and Tainted Variable Detection
In Java 2 and Microsoft .NET Common Language Runtime (CLR), trusted code has often been programmed to perform accessrestricted operations not explicitly requested by its untrusted ...
Marco Pistoia, Robert J. Flynn, Larry Koved, Vugra...