Sciweavers

1380 search results - page 230 / 276
» Reasoning about Input-Output Modeling of Dynamical Systems
Sort
View
SIGSOFT
2008
ACM
14 years 9 months ago
Effective blame for information-flow violations
Programs trusted with secure information should not release that information in ways contrary to system policy. However, when a program contains an illegal flow of information, cu...
Dave King 0002, Trent Jaeger, Somesh Jha, Sanjit A...
FASE
2005
Springer
14 years 2 months ago
Analyzing Web Service Based Business Processes
This paper is concerned with the application of Web services to distributed, cross-organizational business processes. In this scenario, it is crucial to answer the following questi...
Axel Martens
EUROCRYPT
1999
Springer
14 years 1 months ago
A Note on the Limits of Collusion-Resistant Watermarks
In one proposed use of digital watermarks, the owner of a document D sells slightly different documents, D1 , D2 , . . . to each buyer; if a buyer posts his/her document Di to the...
Funda Ergün, Joe Kilian, Ravi Kumar
SIGIR
2010
ACM
14 years 23 days ago
Understanding web browsing behaviors through Weibull analysis of dwell time
Dwell time on Web pages has been extensively used for various information retrieval tasks. However, some basic yet important questions have not been sufficiently addressed, e.g., ...
Chao Liu, Ryen W. White, Susan T. Dumais
WSC
2007
13 years 11 months ago
Self organized UAV swarm planning optimization for search and destroy using SWARMFARE simulation
As military interest continues to grow for Unmanned Aerial Vehicle (UAV) capabilities, the Air Force is exploring UAV autonomous control, mission planning and optimization techniq...
Dustin J. Nowak, Ian C. Price, Gary B. Lamont