Sciweavers

364 search results - page 38 / 73
» E-Voting System Security Optimization
Sort
View
IEEEARES
2010
IEEE
14 years 12 days ago
Optimising IDS Sensor Placement
—In large network environments multiple intrusion detection sensors are needed to adequately monitor network traffic. However, deploying and managing additional sensors on a lar...
Hao Chen, John A. Clark, Siraj A. Shaikh, Howard C...
AGENTS
2001
Springer
14 years 1 months ago
Learning structured reactive navigation plans from executing MDP navigation policies
Autonomous robots, such as robot office couriers, need navigation routines that support flexible task execution and effective action planning. This paper describes XFRMLEARN, a s...
Michael Beetz, Thorsten Belker
ACSAC
1999
IEEE
14 years 25 days ago
Transactions in Java Card
A smart card runtime environment must provide the proper transaction support for the reliable update of data, especially on multiapplication cards like the Java Card. The transact...
Marcus Oestreicher
POPL
2000
ACM
14 years 2 days ago
Generalized Certificate Revocation
We introduce a language for creating and manipulating certificates, that is, digitally signed data based on public key cryptography, and a system for revoking certificates. Our ap...
Carl A. Gunter, Trevor Jim
OOPSLA
1995
Springer
14 years 1 days ago
Bidirectional Object Layout for Separate Compilation
Existing schemes for object layout and dispatch in the presence of multiple inheritance and separate compilation waste space and are slower than systems with single inheritance. T...
Andrew C. Myers