Sciweavers

2948 search results - page 219 / 590
» More Principled Design of Pervasive Computing Systems
Sort
View
IFIP
2005
Springer
15 years 10 months ago
A Logic for Analysing Subterfuge in Delegation Chains
Abstract. Trust Management is an approach to construct and interpret the trust relationships among public-keys that are used to mediate security-critical actions. Cryptographic cre...
Hongbin Zhou, Simon N. Foley
189
Voted
ICMLA
2009
16 years 1 months ago
Statistical Decision Making for Authentication and Intrusion Detection
User authentication and intrusion detection differ from standard classification problems in that while we have data generated from legitimate users, impostor or intrusion data is s...
Christos Dimitrakakis, Aikaterini Mitrokotsa
126
Voted
ACE
2004
221views Education» more  ACE 2004»
15 years 6 months ago
Personal Software Process in the Database Course
This paper describes the integration of the Personal Software Process (PSP) into an introductory database course in an MIS curriculum. PSP is a highly disciplined, process-based a...
William I. Bullers Jr.
COLING
2002
15 years 4 months ago
Text Authoring, Knowledge Acquisition and Description Logics
We present a principled approach to the problem of connecting a controlled document authoring system with a knowledge base. We start by describingclosed-world authoring situations...
Marc Dymetman
141
Voted
PERCOM
2003
ACM
16 years 4 months ago
Portability, Extensibility and Robustness in iROS
The dynamism and heterogeneity in ubicomp environments on both short and long time scales implies that middleware platforms for these environments need to be designed ground up fo...
Shankar Ponnekanti, Brad Johanson, Emre Kiciman, A...