Sciweavers

27 search results - page 5 / 6
» Hybrid transitive trust mechanisms
Sort
View
ECAL
2007
Springer
14 years 1 months ago
Neuroevolution of Agents Capable of Reactive and Deliberative Behaviours in Novel and Dynamic Environments
Both reactive and deliberative qualities are essential for a good action selection mechanism. We present a model that embodies a hybrid of two very different neural network archit...
Edward Robinson, Timothy Ellis, Alastair Channon
ESORICS
2009
Springer
14 years 2 months ago
Privacy Preservation over Untrusted Mobile Networks
The proliferation of mobile devices has given rise to novel user-centric applications and services. In current mobile systems, users gain access to remote servers over mobile netwo...
Claudio Agostino Ardagna, Sushil Jajodia, Pierange...
WWCA
1998
Springer
13 years 12 months ago
Compact and Flexible Resolution of CBT Multicast Key-Distribution
In an open network such as the Internet, multicast security services typically start with group session-key distribution. Considering scalability for group communication among wide...
Kanta Matsuura, Yuliang Zheng, Hideki Imai
SP
2005
IEEE
188views Security Privacy» more  SP 2005»
14 years 1 months ago
BIND: A Fine-Grained Attestation Service for Secure Distributed Systems
In this paper, we propose BIND (Binding Instructions aNd Data),1 a fine-grained attestation service for securing distributed systems. Code attestation has recently received consi...
Elaine Shi, Adrian Perrig, Leendert van Doorn
ICAPR
2005
Springer
14 years 1 months ago
Hierarchical Clustering of Dynamical Systems Based on Eigenvalue Constraints
Abstract. This paper addresses the clustering problem of hidden dynamical systems behind observed multivariate sequences by assuming an interval-based temporal structure in the seq...
Hiroaki Kawashima, Takashi Matsuyama