Sciweavers

123 search results - page 21 / 25
» Patterns for Automated Management of Security and Dependabil...
Sort
View
BIBM
2007
IEEE
139views Bioinformatics» more  BIBM 2007»
13 years 10 months ago
Automatic Identification of Temporal Sequences in Chewing Sounds
Chewing is an essential part of food intake. The analysis and detection of food patterns is an important component of an automatic dietary monitoring system. However chewing is a t...
Oliver Amft, Martin Kusserow, Gerhard Tröster
WPES
2003
ACM
13 years 12 months ago
Policy migration for sensitive credentials in trust negotiation
Trust negotiation is an approach to establishing trust between strangers through the bilateral, iterative disclosure of digital credentials. Under automated trust negotiation, acc...
Ting Yu, Marianne Winslett
ATAL
2008
Springer
13 years 8 months ago
Regulating air traffic flow with coupled agents
The ability to provide flexible, automated management of air traffic is critical to meeting the ever increasing needs of the next generation air transportation systems. This probl...
Adrian K. Agogino, Kagan Tumer
SOUPS
2009
ACM
14 years 1 months ago
How users use access control
Existing technologies for file sharing differ widely in the granularity of control they give users over who can access their data; achieving finer-grained control generally requ...
Diana K. Smetters, Nathan Good
IEEEPACT
2006
IEEE
14 years 23 days ago
A low-cost memory remapping scheme for address bus protection
The address sequence on the processor-memory bus can reveal abundant information about the control flow of a program. This can lead to critical information leakage such as encryp...
Lan Gao, Jun Yang 0002, Marek Chrobak, Youtao Zhan...