Sciweavers

298 search results - page 19 / 60
» Computer security: quality rather than quantity
Sort
View
HICSS
2007
IEEE
103views Biometrics» more  HICSS 2007»
14 years 4 months ago
Colombia Firm Energy Market
A firm energy market for Colombia is presented. Firm energy—the ability to provide energy in a dry period—is the product needed for reliability in Colombia’s hydrodominated ...
Peter Cramton, Steven Stoft
CASCON
2007
1035views Education» more  CASCON 2007»
13 years 11 months ago
An IDE for software development using tabular expressions
We present preliminary work on an IDE for formal software development using tabular expressions as the basis for precise specifications and descriptions of software behaviour. 1 ...
Dennis K. Peters, Mark Lawford, Baltasar Tranc&oac...
IMC
2010
ACM
13 years 7 months ago
Internet background radiation revisited
The monitoring of packets destined for reachable, yet unused, Internet addresses has proven to be a useful technique for measuring a variety of specific Internet phenomenon (e.g.,...
Eric Wustrow, Manish Karir, Michael Bailey, Farnam...
CPAIOR
2008
Springer
13 years 11 months ago
Leveraging Belief Propagation, Backtrack Search, and Statistics for Model Counting
We consider the problem of estimating the model count (number of solutions) of Boolean formulas, and present two techniques that compute estimates of these counts, as well as eith...
Lukas Kroc, Ashish Sabharwal, Bart Selman
WPES
2004
ACM
14 years 3 months ago
Hidden access control policies with hidden credentials
In an open environment such as the Internet, the decision to collaborate with a stranger (e.g., by granting access to a resource) is often based on the characteristics (rather tha...
Keith B. Frikken, Mikhail J. Atallah, Jiangtao Li