Sciweavers

1404 search results - page 240 / 281
» On optimal input design in system identification for control
Sort
View
CCS
2003
ACM
14 years 2 months ago
Cryptographic tamper evidence
We propose a new notion of cryptographic tamper evidence. A tamper-evident signature scheme provides an additional procedure Div which detects tampering: given two signatures, Div...
Gene Itkis
JAIR
2010
165views more  JAIR 2010»
13 years 7 months ago
A Model-Based Active Testing Approach to Sequential Diagnosis
Model-based diagnostic reasoning often leads to a large number of diagnostic hypotheses. The set of diagnoses can be reduced by taking into account extra observations (passive mon...
Alexander Feldman, Gregory M. Provan, Arjan J. C. ...
CSFW
2009
IEEE
14 years 3 months ago
More Anonymous Onion Routing Through Trust
We consider using trust information to improve the anonymity provided by onion-routing networks. In particular, we introduce a model of trust in network nodes and use it to design...
Aaron Johnson, Paul F. Syverson
AIIDE
2008
13 years 11 months ago
Automatic Generation of Game Level Solutions as Storyboards
Interactive Storytelling techniques are attracting much interest for their potential to develop new game genres but also as another form of procedural content generation, specific...
David Pizzi, Marc Cavazza, Alex Whittaker, Jean-Lu...
CCS
2005
ACM
14 years 2 months ago
CPOL: high-performance policy evaluation
Policy enforcement is an integral part of many applications. Policies are often used to control access to sensitive information. Current policy specification languages give users ...
Kevin Borders, Xin Zhao, Atul Prakash