Sciweavers

3424 search results - page 601 / 685
» Building Diverse Computer Systems
Sort
View
114
Voted
CSFW
2007
IEEE
15 years 9 months ago
Compositional Security for Task-PIOAs
Task-PIOA is a modeling framework for distributed systems with both probabilistic and nondeterministic behaviors. It is suitable for cryptographic applications because its task-bas...
Ran Canetti, Ling Cheung, Dilsun Kirli Kaynar, Nan...
IJCNN
2007
IEEE
15 years 8 months ago
Risk Assessment Algorithms Based on Recursive Neural Networks
— The assessment of highly-risky situations at road intersections have been recently revealed as an important research topic within the context of the automotive industry. In thi...
Alejandro Chinea Manrique De Lara, Michel Parent
139
Voted
P2P
2007
IEEE
165views Communications» more  P2P 2007»
15 years 8 months ago
An Information-Theoretic Framework for Analyzing Leak of Privacy in Distributed Hash Tables
An important security issue in DHT-based structured overlay networks is to provide anonymity to the storage nodes. Compromised routing tables in those DHTs leak information about ...
Souvik Ray, Zhao Zhang
134
Voted
TABLETOP
2007
IEEE
15 years 8 months ago
T3: Rapid Prototyping of High-Resolution and Mixed-Presence Tabletop Applications
Multi-person tabletop applications that require a high display resolution, such as collaborative web-browsing, are currently very difficult to create. Tabletop systems that suppo...
Peter Robinson, Philip Tuddenham
ICSOC
2007
Springer
15 years 8 months ago
User-Driven Service Lifecycle Management - Adopting Internet Paradigms in Telecom Services
The user-centric service creation paradigm set out in Web 2.0 technologies on the Internet allows users to define and share their new content and applications. Open services and in...
Juan C. Yelmo, Rubén Trapero, José M...