Sciweavers

657 search results - page 27 / 132
» Recovering architectural assumptions
Sort
View
ACSAC
2000
IEEE
14 years 1 months ago
Secure Compartmented Data Access over an Untrusted Network using a COTS-based Architecture
In this paper, we present an approach to secure compartmented data access over an untrusted network using a secure network computing architecture. We describe the architecture and...
P. C. Clark, M. C. Meissner, K. O. Vance
JSA
2007
89views more  JSA 2007»
13 years 8 months ago
Robust codes and robust, fault-tolerant architectures of the Advanced Encryption Standard
— Hardware implementations of cryptographic algorithms are vulnerable to fault analysis attacks. Methods based on traditional fault-tolerant architectures are not suited for prot...
Konrad J. Kulikowski, Mark G. Karpovsky, Alexander...
WEBI
2005
Springer
14 years 2 months ago
An Adaptive Architecture for Physical Agents
In this paper we describe ICARUS, an adaptive architecture for intelligent physical agents. We contrast the framework’s assumptions with those of earlier architectures, taking e...
Pat Langley
ICPR
2002
IEEE
14 years 10 months ago
A Neural Architecture for Fast and Robust Face Detection
In this paper, we present a connectionist approach for detecting and precisely localizing semi-frontal human faces in complex images, making no assumption about the content or the...
Christophe Garcia, Manolis Delakis
ICSOC
2007
Springer
14 years 3 months ago
Deriving SOA Evaluation Metrics in an Enterprise Architecture Context
Abstract. Service oriented architectures (SOA) are becoming reality in a corporate environment. Rather than pure technology improvements SOA intends to increase manageability and s...
Stephan Aier, Maximilian Ahrens, Matthias Stutz, U...