Sciweavers

407 search results - page 71 / 82
» Malleable Proof Systems and Applications
Sort
View
COMPSEC
2010
122views more  COMPSEC 2010»
13 years 5 months ago
Taming role mining complexity in RBAC
In this paper we address the problem of reducing the role mining complexity in RBAC systems. To this aim, we propose a three steps methodology: first, we associate a weight to rol...
Alessandro Colantonio, Roberto Di Pietro, Alberto ...
ICES
2010
Springer
148views Hardware» more  ICES 2010»
13 years 5 months ago
HyperNEAT for Locomotion Control in Modular Robots
Abstract. In an application where autonomous robots can amalgamate spontaneously into arbitrary organisms, the individual robots cannot know a priori at which location in an organi...
Evert Haasdijk, Andrei A. Rusu, A. E. Eiben
ICASSP
2011
IEEE
12 years 11 months ago
Quadrature approximation properties of the spiral-phase quadrature transform
The notion of the 1-D analytic signal is well understood and has found many applications. At the heart of the analytic signal concept is the Hilbert transform. The problem in exte...
Haricharan Aragonda, Chandra Sekhar Seelamantula
HOST
2011
IEEE
12 years 7 months ago
Enhancing security via provably trustworthy hardware intellectual property
—We introduce a novel hardware intellectual property acquisition protocol, show how it can support the transfer of provably trustworthy modules between hardware IP producers and ...
Eric Love, Yier Jin, Yiorgos Makris
ECTEL
2006
Springer
13 years 11 months ago
Peer-to-peer Face-to-face Collaboration
In this paper, we present a proof of concept application of a technique that is designed explicitly for face to face collaboration software architectures. The objective is to minim...
Delfina Malandrino, Ilaria Manno