Sciweavers

2270 search results - page 391 / 454
» Modelling Secure IT Systems - A Survey
Sort
View
PET
2004
Springer
15 years 9 months ago
Anonymity and Covert Channels in Simple Timed Mix-Firewalls
Traditional methods for evaluating the amount of anonymity afforded by various Mix configurations have depended on either measuring the size of the set of possible senders of a p...
Richard E. Newman, Vipan R. Nalla, Ira S. Moskowit...
118
Voted
ACSAC
2003
IEEE
15 years 9 months ago
Behavioral Authentication of Server Flows
Understanding the nature of the information flowing into and out of a system or network is fundamental to determining if there is adherence to a usage policy. Traditional methods...
James P. Early, Carla E. Brodley, Catherine Rosenb...
AGENTS
2001
Springer
15 years 8 months ago
Social role awareness in animated agents
This paper promotes social role awareness as a desirable capability of animated agents, that are by now strong affective reasoners, but otherwise often lack the social competence ...
Helmut Prendinger, Mitsuru Ishizuka
190
Voted
OOPSLA
2001
Springer
15 years 8 months ago
Points-To Analysis for Java using Annotated Constraints
The goal of points-to analysis for Java is to determine the set of objects pointed to by a reference variable or a reference object field. This information has a wide variety of ...
Atanas Rountev, Ana Milanova, Barbara G. Ryder
132
Voted
AGENTS
1997
Springer
15 years 8 months ago
A Methodology for Building Believable Social Agents
Believable agents are defined to be interactive versions of quality characters in traditional artistic media like film. Such agents are useful in applications such as interactive ...
W. Scott Neal Reilly