Sciweavers

26 search results - page 4 / 6
» Action and behavior: a free-energy formulation
Sort
View
CSFW
2007
IEEE
14 years 1 months ago
Compositional Security for Task-PIOAs
Task-PIOA is a modeling framework for distributed systems with both probabilistic and nondeterministic behaviors. It is suitable for cryptographic applications because its task-bas...
Ran Canetti, Ling Cheung, Dilsun Kirli Kaynar, Nan...
ICMCS
2006
IEEE
138views Multimedia» more  ICMCS 2006»
14 years 1 months ago
Detecting Malicious Hosts in the Presence of Lying Hosts in Peer-to-Peer Streaming
Current peer-to-peer (P2P) streaming systems often assume that hosts are cooperative. However, this may not be true in the open environment of the Internet. In this paper, we disc...
Xing Jin, S.-H. Gary Chan, Wai-Pun Ken Yiu, Yongqi...
SIGSOFT
2009
ACM
14 years 7 days ago
Qos-driven runtime adaptation of service oriented architectures
Runtime adaptation is recognized as a viable way for a serviceoriented system to meet QoS requirements in its volatile operating environment. In this paper we propose a methodolog...
Valeria Cardellini, Emiliano Casalicchio, Vincenzo...
ACSAC
1999
IEEE
13 years 12 months ago
Security Relevancy Analysis on the Registry of Windows NT 4.0
Many security breaches are caused by inappropriate inputs crafted by people with malicious intents. To enhance the system security, we need either to ensure that inappropriate inp...
Wenliang Du, Praerit Garg, Aditya P. Mathur
SIGIR
2010
ACM
13 years 11 months ago
Query log analysis in the context of information retrieval for children
In this paper we analyze queries and sessions intended to satisfy children’s information needs using a large-scale query log. The aim of this analysis is twofold: i) To identify...
Sergio Duarte Torres, Djoerd Hiemstra, Pavel Serdy...