Sciweavers

364 search results - page 54 / 73
» E-Voting System Security Optimization
Sort
View
DATESO
2010
150views Database» more  DATESO 2010»
13 years 5 months ago
Evolving Quasigroups by Genetic Algorithms
Abstract. Quasigroups are a well-known combinatorial design equivalent to more familiar Latin squares. Because all possible elements of a quasigroup occur with equal probability, i...
Václav Snásel, Jiri Dvorský, ...
IEAAIE
2010
Springer
13 years 5 months ago
Temporal Bounded Planner Agent for Dynamic Industrial Environments
This paper presents a time bounded real-time agent, the core of a Multi-agent System aimed at managing the security in manufacturing environments, where time constraints are a key ...
Juan Francisco de Paz, Martí Navarro, Sara ...
CCS
2005
ACM
14 years 28 days ago
CPOL: high-performance policy evaluation
Policy enforcement is an integral part of many applications. Policies are often used to control access to sensitive information. Current policy specification languages give users ...
Kevin Borders, Xin Zhao, Atul Prakash
EUROSYS
2010
ACM
14 years 14 days ago
Defeating return-oriented rootkits with "Return-Less" kernels
Targeting the operating system (OS) kernels, kernel rootkits pose a formidable threat to computer systems and their users. Recent efforts have made significant progress in blocki...
Jinku Li, Zhi Wang, Xuxian Jiang, Michael C. Grace...
COMPSAC
2009
IEEE
14 years 2 months ago
The Design and Implementation of a Bare PC Email Server
— This paper presents the architecture, design and implementation of an email server that runs on a bare PC without an operating system or hard-disk. In addition to providing sta...
George H. Ford Jr., Ramesh K. Karne, Alexander L. ...