Sciweavers

461 search results - page 38 / 93
» Protecting Transportation Infrastructure
Sort
View
DEBS
2009
ACM
15 years 6 months ago
Event-based systems: opportunities and challenges at exascale
Streaming data models have been shown to be useful in many applications requiring high-performance data exchange. Application-level overlay networks are a natural way to realize t...
Greg Eisenhauer, Matthew Wolf, Hasan Abbasi, Karst...
116
Voted
IEEEIAS
2008
IEEE
15 years 9 months ago
A Model for the Study of Privacy Issues in Secure Shell Connections
: The Secure Shell (SSH) protocol strives to protect the privacy of its users in several ways. On one hand, the strong encryption and authentication algorithms that it adopts provi...
Maurizio Dusi, Francesco Gringoli, Luca Salgarelli
JAIR
2008
108views more  JAIR 2008»
15 years 3 months ago
A Multiagent Approach to Autonomous Intersection Management
Artificial intelligence research is ushering in a new era of sophisticated, mass-market transportation technology. While computers can already fly a passenger jet better than a tr...
Kurt M. Dresner, Peter Stone
117
Voted
MCAM
2007
Springer
115views Multimedia» more  MCAM 2007»
15 years 9 months ago
Evolvement of DRM Schema: From Encryption to Interoperability and Monitoring
By reviewing DRMs up to now and two typical examples – AVS DRM and DMP IDP, the paper tries to find out the fundamental challenge of content protection approach from technical an...
Tiejun Huang
143
Voted
CONTEXT
2003
Springer
15 years 8 months ago
A Generic Framework for Context-Based Distributed Authorizations
In conventional security systems, protected resources such as documents, hardware devices and software applications follow an On/Off access policy. On, allows to grant access and ...
Ghita Kouadri Mostéfaoui, Patrick Bré...