Sciweavers

516 search results - page 71 / 104
» Comparing Two Information Flow Security Properties
Sort
View
DAC
2002
ACM
14 years 10 months ago
Watermarking integer linear programming solutions
Linear programming (LP) in its many forms has proven to be an indispensable tool for expressing and solving optimization problems in numerous domains. We propose the first set of ...
Seapahn Megerian, Milenko Drinic, Miodrag Potkonja...
EUROCRYPT
2007
Springer
14 years 24 days ago
Instance-Dependent Verifiable Random Functions and Their Application to Simultaneous Resettability
Abstract. We introduce a notion of instance-dependent verifiable random functions (InstD-VRFs for short). Informally, an InstD-VRF is, in some sense, a verifiable random function [...
Yi Deng, Dongdai Lin
VIZSEC
2005
Springer
14 years 2 months ago
Multiple Coordinated Views for Network Attack Graphs
While efficient graph-based representations have been developed for modeling combinations of low-level network attacks, relatively little attention has been paid to effective tech...
Steven Noel, Michael Jacobs, Pramod Kalapa, Sushil...
COOPIS
2004
IEEE
14 years 20 days ago
Active Replication in CORBA: Standards, Protocols, and Implementation Framework
This paper presents a proposal for integrating in a single CORBA middleware platform two important OMG specifications: FTCORBA, which provides fault-tolerance support for CORBA obj...
Alysson Neves Bessani, Joni da Silva Fraga, Lau Ch...
JAIR
2011
84views more  JAIR 2011»
13 years 3 months ago
Evaluating Temporal Graphs Built from Texts via Transitive Reduction
Temporal information has been the focus of recent attention in information extraction, leading to some standardization effort, in particular for the task of relating events in a t...
Xavier Tannier, Philippe Muller