Sciweavers

781 search results - page 95 / 157
» An Integrated Model for Hybrid Securities
Sort
View
COLCOM
2005
IEEE
14 years 2 months ago
Providing both scale and security through a single core probabilistic protocol
Distributed systems are typically designed for scale and performance first, which makes it difficult to add security later without affecting the original properties. This paper ...
Ramsés Morales, Indranil Gupta
CIMCA
2006
IEEE
14 years 2 months ago
A Knowledge-based Security Policy Framework for Business Process Management
Business Process Management (BPM) is often a key component of the business change. Business rules, whether embedded within BPM or on their own, have begun playing an ever-increasi...
Dong Huang, Yi Yang, Jacques Calmet
COMPLEXITY
2007
151views more  COMPLEXITY 2007»
13 years 8 months ago
From complex conflicts to stable cooperation: Cases in environment and security
: Conflict is a dynamic and complex form of human interaction, often emerging from incompatible actions, values and goals, and consuming a considerable amount of resources. Conflic...
Jürgen Scheffran, Bruce Hannon
WWCA
1998
Springer
14 years 28 days ago
Compact and Flexible Resolution of CBT Multicast Key-Distribution
In an open network such as the Internet, multicast security services typically start with group session-key distribution. Considering scalability for group communication among wide...
Kanta Matsuura, Yuliang Zheng, Hideki Imai
ICPR
2006
IEEE
14 years 9 months ago
Mixture of Support Vector Machines for HMM based Speech Recognition
Speech recognition is usually based on Hidden Markov Models (HMMs), which represent the temporal dynamics of speech very efficiently, and Gaussian mixture models, which do non-opt...
Sven E. Krüger, Martin Schafföner, Marce...