Sciweavers

1348 search results - page 26 / 270
» Keynote Address I
Sort
View
SOCIALCOM
2010
15 years 1 months ago
A Decision Theoretic Approach to Data Leakage Prevention
Abstract--In both the commercial and defense sectors a compelling need is emerging for rapid, yet secure, dissemination of information. In this paper we address the threat of infor...
Janusz Marecki, Mudhakar Srivatsa, Pradeep Varakan...
179
Voted
ICC
2009
IEEE
171views Communications» more  ICC 2009»
15 years 1 months ago
IPsec-Based Anonymous Networking: A Working Implementation
Protecting users' privacy is becoming one of the rising issues for the success of future communications. The Internet in particular, with its open architecture, presents sever...
Csaba Király, Renato Lo Cigno
91
Voted
ICSE
2009
IEEE-ACM
15 years 10 months ago
Towards safety guarantees for service-oriented systems
In this paper I will address the problem of verifying that a service-oriented embedded system fulÀlls required safety guarantees. Services will be represented by collaborations a...
Basil Becker
111
Voted
GI
2004
Springer
15 years 9 months ago
Vision as an Exercise in Organic Computing
Abstract: The vision process is very complex and requires for its realization in artificial systems a fundamentally new technology for systems generation. This must be based on pr...
Christoph von der Malsburg
131
Voted
DRR
2004
15 years 6 months ago
Group discriminatory power of handwritten characters
Using handwritten characters we address two questions (i) what is the group identification performance of different alphabets (upper and lower case) and (ii) what are the best cha...
Catalin I. Tomai, Devika M. Kshirsagar, Sargur N. ...