Sciweavers

364 search results - page 54 / 73
» E-Voting System Security Optimization
Sort
View
102
Voted
DATESO
2010
150views Database» more  DATESO 2010»
15 years 19 days ago
Evolving Quasigroups by Genetic Algorithms
Abstract. Quasigroups are a well-known combinatorial design equivalent to more familiar Latin squares. Because all possible elements of a quasigroup occur with equal probability, i...
Václav Snásel, Jiri Dvorský, ...
100
Voted
IEAAIE
2010
Springer
15 years 17 days ago
Temporal Bounded Planner Agent for Dynamic Industrial Environments
This paper presents a time bounded real-time agent, the core of a Multi-agent System aimed at managing the security in manufacturing environments, where time constraints are a key ...
Juan Francisco de Paz, Martí Navarro, Sara ...
131
Voted
CCS
2005
ACM
15 years 8 months ago
CPOL: high-performance policy evaluation
Policy enforcement is an integral part of many applications. Policies are often used to control access to sensitive information. Current policy specification languages give users ...
Kevin Borders, Xin Zhao, Atul Prakash
118
Voted
EUROSYS
2010
ACM
15 years 7 months ago
Defeating return-oriented rootkits with "Return-Less" kernels
Targeting the operating system (OS) kernels, kernel rootkits pose a formidable threat to computer systems and their users. Recent efforts have made significant progress in blocki...
Jinku Li, Zhi Wang, Xuxian Jiang, Michael C. Grace...
117
Voted
COMPSAC
2009
IEEE
15 years 9 months ago
The Design and Implementation of a Bare PC Email Server
— This paper presents the architecture, design and implementation of an email server that runs on a bare PC without an operating system or hard-disk. In addition to providing sta...
George H. Ford Jr., Ramesh K. Karne, Alexander L. ...