Sciweavers

5252 search results - page 987 / 1051
» Logic in Access Control
Sort
View
TSMC
2010
13 years 4 months ago
An Architecture for Adaptive Algorithmic Hybrids
We describe a cognitive architecture for creating more robust intelligent systems by executing hybrids of algorithms based on different computational formalisms. The architecture ...
Nicholas L. Cassimatis, Perrin G. Bignoli, Magdale...
QSHINE
2009
IEEE
14 years 4 months ago
Integration of OMF-Based Testbeds in a Global-Scale Networking Facility
PlanetLab is a global scale platform for experimentation of new networking applications in a real environment. It consists of several nodes, offered by academic institutions or co...
Giovanni Di Stasi, Stefano Avallone, Roberto Canon...
FDTC
2009
Springer
189views Cryptology» more  FDTC 2009»
14 years 4 months ago
KeeLoq and Side-Channel Analysis-Evolution of an Attack
—Last year we were able to break KeeLoq, which is a 64 bit block cipher that is popular for remote keyless entry (RKE) systems. KeeLoq RKEs are widely used for access control pur...
Christof Paar, Thomas Eisenbarth, Markus Kasper, T...
ICIP
2006
IEEE
14 years 11 months ago
Extending Single-View Scalable Video Coding to Multi-View Based on H.264/AVC
An extension of single-view scalable video coding to multiview is presented in this paper. Scalable video coding is recently developed in the Joint Video Team of ISO/IEC MPEG and ...
Michael Drose, Carsten Clemens, Thomas Sikora
ICDE
2008
IEEE
129views Database» more  ICDE 2008»
14 years 11 months ago
Optimal Boolean Matrix Decomposition: Application to Role Engineering
Abstract-- A decomposition of a binary matrix into two matrices gives a set of basis vectors and their appropriate combination to form the original matrix. Such decomposition solut...
Haibing Lu, Jaideep Vaidya, Vijayalakshmi Atluri