Sciweavers

964 search results - page 36 / 193
» On Securely Scheduling a Meeting
Sort
View
CSFW
2008
IEEE
14 years 5 months ago
Information Flow in Systems with Schedulers
Abstract. The focus of work on information flow security has primarily been on definitions of security in asynchronous systems models. This paper considers systems with scheduler...
Ron van der Meyden, Chenyi Zhang
AGENTS
2001
Springer
14 years 3 months ago
Scheduling multi-task multi-agent systems
We present a centralized and a distributed algorithms for scheduling multi-task agents in heterogeneous networks. Our centralized algorithm has an upper bound on the overall compl...
Rong Xie, Daniela Rus, Clifford Stein
GCC
2004
Springer
14 years 4 months ago
A Software Engineering Perspective for Services Security
Services are usually developed and deployed independently; and systems can be formed by composing relevant services to achieve set goals. In such an open and dynamic environment, s...
Jun Han
WCNC
2008
IEEE
14 years 5 months ago
Using Swarm Intelligence and Bayesian Inference for Aircraft Interrogation
: Sensor management deals with the efficient resource allocation to meet mission objectives of the application, air traffic control. A schedule for the sensors is constructed, whic...
Ganapathi Kamath, Xiang Ye, Lisa Ann Osadciw
ESORICS
2004
Springer
14 years 4 months ago
On the Role of Key Schedules in Attacks on Iterated Ciphers
This paper considers iterated ciphers and their resistance against linear and differential cryptanalysis. In the theory of these attacks one assumes independence of the round keys...
Lars R. Knudsen, John Erik Mathiassen