Sciweavers

94 search results - page 10 / 19
» Can I Add a Secure VoIP Call
Sort
View
AAAI
2000
13 years 9 months ago
Adaptive User Interfaces through Dynamic Design Automation
The inherent difficulty in supporting human usability in large control systems--such as building environmental and security systems--derives from the large diversity of components...
Robin R. Penner, Erik S. Steinmetz, Christopher L....
CANS
2010
Springer
150views Cryptology» more  CANS 2010»
13 years 5 months ago
Predicate Encryption with Partial Public Keys
Abstract. Predicate encryption is a new powerful cryptographic primitive which allows for fine-grained access control for encrypted data: the owner of the secret key can release pa...
Carlo Blundo, Vincenzo Iovino, Giuseppe Persiano
CORR
2010
Springer
116views Education» more  CORR 2010»
13 years 2 months ago
Simulating Cyber-Attacks for Fun and Profit
We introduce a new simulation platform called Insight, created to design and simulate cyber-attacks against large arbitrary target scenarios. Insight has surprisingly low hardware...
Ariel Futoransky, Fernando Miranda, José Ig...
CORR
2010
Springer
102views Education» more  CORR 2010»
13 years 7 months ago
Stable Takens' Embeddings for Linear Dynamical Systems
Takens' Embedding Theorem remarkably established that concatenating M previous outputs of a dynamical system into a vector (called a delay coordinate map) can be a one-to-one...
Han Lun Yap, Christopher J. Rozell
DBISP2P
2005
Springer
131views Database» more  DBISP2P 2005»
14 years 1 months ago
Symmetric Replication for Structured Peer-to-Peer Systems
Structured peer-to-peer systems rely on replication as a basic means to provide fault-tolerance in presence of high churn. Most select replicas using either multiple hash functions...
Ali Ghodsi, Luc Onana Alima, Seif Haridi