Sciweavers

71 search results - page 5 / 15
» On Tamper-Resistance from a Theoretical Viewpoint
Sort
View
IAT
2010
IEEE
13 years 5 months ago
Risk Analysis in Access Control Systems Based on Trust Theories
There is a need for research on the scientific base and engineering requirements for building trustworthy systems in dynamic environments. To address this need, we study risk analy...
J. Ma, Luigi Logrippo, Kamel Adi, Serge Mankovski
GI
2007
Springer
14 years 1 months ago
CAMPUS NEWS - an Information Network for Pervasive Universities
Abstract: In this paper we describe a network for distributing personalized Information within a pervasive University. We discuss the system architecture of our Bluetoothbased Camp...
Ulrich Furbach, Markus Maron, Kevin Read
ICDM
2007
IEEE
116views Data Mining» more  ICDM 2007»
14 years 1 months ago
Cross-Mining Binary and Numerical Attributes
We consider the problem of relating itemsets mined on binary attributes of a data set to numerical attributes of the same data. An example is biogeographical data, where the numer...
Gemma C. Garriga, Hannes Heikinheimo, Jouni K. Sep...
ISVD
2007
IEEE
14 years 1 months ago
From the Kneser-Poulsen conjecture to ball-polyhedra via Voronoi diagrams
A very fundamental geometric problem on finite systems of spheres was independently phrased by Kneser (1955) and Poulsen (1954). According to their well-known conjecture if a fi...
Károly Bezdek
SEC
2000
13 years 8 months ago
Using Mobile Agent Results to Create Hard-to-Detect Computer Viruses
The theory of computer viruses has been studied by several authors, though there is no systematic theoretical study up to now. The long time open question in this area is as follo...
Yongge Wang