Sciweavers

13791 search results - page 2632 / 2759
» Modeling Web Interactions
Sort
View
AGENTS
2001
Springer
15 years 6 months ago
Wasp nests for self-configurable factories
Agent-based approaches to manufacturing scheduling and control have gained increasing attention in recent years. Such approaches are attractive because they o er increased robustn...
Vincent A. Cicirello, Stephen F. Smith
ICDE
2000
IEEE
161views Database» more  ICDE 2000»
15 years 6 months ago
Efficient Query Refinement in Multimedia Databases
Increasing application demands are pushing database management systems (DBMSs) towards providing adequate and efficient support for content-based retrieval over multimedia objects...
Kaushik Chakrabarti, Kriengkrai Porkaew, Sharad Me...
130
Voted
ASIACRYPT
2008
Springer
15 years 4 months ago
A Modular Security Analysis of the TLS Handshake Protocol
We study the security of the widely deployed Secure Session Layer/Transport Layer Security (TLS) key agreement protocol. Our analysis identifies, justifies, and exploits the modul...
Paul Morrissey, Nigel P. Smart, Bogdan Warinschi
161
Voted
EUROCRYPT
2008
Springer
15 years 4 months ago
Efficient Two Party and Multi Party Computation Against Covert Adversaries
Recently, Aumann and Lindell introduced a new realistic security model for secure computation, namely, security against covert adversaries. The main motivation was to obtain secure...
Vipul Goyal, Payman Mohassel, Adam Smith
DIMVA
2010
15 years 3 months ago
Take a Deep Breath: A Stealthy, Resilient and Cost-Effective Botnet Using Skype
Abstract. Skype is one of the most used P2P applications on the Internet: VoIP calls, instant messaging, SMS and other features are provided at a low cost to millions of users. Alt...
Antonio Nappa, Aristide Fattori, Marco Balduzzi, M...
« Prev « First page 2632 / 2759 Last » Next »