Sciweavers

94 search results - page 10 / 19
» Can I Add a Secure VoIP Call
Sort
View
121
Voted
AAAI
2000
15 years 5 months ago
Adaptive User Interfaces through Dynamic Design Automation
The inherent difficulty in supporting human usability in large control systems--such as building environmental and security systems--derives from the large diversity of components...
Robin R. Penner, Erik S. Steinmetz, Christopher L....
CANS
2010
Springer
150views Cryptology» more  CANS 2010»
15 years 1 months ago
Predicate Encryption with Partial Public Keys
Abstract. Predicate encryption is a new powerful cryptographic primitive which allows for fine-grained access control for encrypted data: the owner of the secret key can release pa...
Carlo Blundo, Vincenzo Iovino, Giuseppe Persiano
142
Voted
CORR
2010
Springer
116views Education» more  CORR 2010»
14 years 10 months ago
Simulating Cyber-Attacks for Fun and Profit
We introduce a new simulation platform called Insight, created to design and simulate cyber-attacks against large arbitrary target scenarios. Insight has surprisingly low hardware...
Ariel Futoransky, Fernando Miranda, José Ig...
132
Voted
CORR
2010
Springer
102views Education» more  CORR 2010»
15 years 3 months ago
Stable Takens' Embeddings for Linear Dynamical Systems
Takens' Embedding Theorem remarkably established that concatenating M previous outputs of a dynamical system into a vector (called a delay coordinate map) can be a one-to-one...
Han Lun Yap, Christopher J. Rozell
125
Voted
DBISP2P
2005
Springer
131views Database» more  DBISP2P 2005»
15 years 9 months ago
Symmetric Replication for Structured Peer-to-Peer Systems
Structured peer-to-peer systems rely on replication as a basic means to provide fault-tolerance in presence of high churn. Most select replicas using either multiple hash functions...
Ali Ghodsi, Luc Onana Alima, Seif Haridi