Sciweavers

1348 search results - page 26 / 270
» Keynote Address I
Sort
View
SOCIALCOM
2010
13 years 5 months ago
A Decision Theoretic Approach to Data Leakage Prevention
Abstract--In both the commercial and defense sectors a compelling need is emerging for rapid, yet secure, dissemination of information. In this paper we address the threat of infor...
Janusz Marecki, Mudhakar Srivatsa, Pradeep Varakan...
ICC
2009
IEEE
171views Communications» more  ICC 2009»
13 years 5 months ago
IPsec-Based Anonymous Networking: A Working Implementation
Protecting users' privacy is becoming one of the rising issues for the success of future communications. The Internet in particular, with its open architecture, presents sever...
Csaba Király, Renato Lo Cigno
ICSE
2009
IEEE-ACM
14 years 2 months ago
Towards safety guarantees for service-oriented systems
In this paper I will address the problem of verifying that a service-oriented embedded system fulÀlls required safety guarantees. Services will be represented by collaborations a...
Basil Becker
GI
2004
Springer
14 years 28 days ago
Vision as an Exercise in Organic Computing
Abstract: The vision process is very complex and requires for its realization in artificial systems a fundamentally new technology for systems generation. This must be based on pr...
Christoph von der Malsburg
DRR
2004
13 years 10 months ago
Group discriminatory power of handwritten characters
Using handwritten characters we address two questions (i) what is the group identification performance of different alphabets (upper and lower case) and (ii) what are the best cha...
Catalin I. Tomai, Devika M. Kshirsagar, Sargur N. ...