Sciweavers

501 search results - page 24 / 101
» Redundancy and Diversity in Security
Sort
View
ISMIS
2005
Springer
14 years 1 months ago
Robust Inference of Bayesian Networks Using Speciated Evolution and Ensemble
Recently, there are many researchers to design Bayesian network structures using evolutionary algorithms but most of them use the only one fittest solution in the last generation. ...
Kyung-Joong Kim, Ji-Oh Yoo, Sung-Bae Cho
ICNP
2002
IEEE
14 years 1 months ago
Optimal Stream Replication for Video Simulcasting
Abstract—Video simulcasting enables a sender to generate replicated streams of different rates, serving receivers of diverse access bandwidths. As replication introduces noticeab...
Jiangchuan Liu, Bo Li
CCS
2006
ACM
13 years 11 months ago
Secure attribute-based systems
Attributes define, classify, or annotate the datum to which they are assigned. However, traditional attribute architectures and cryptosystems are ill-equipped to provide security ...
Matthew Pirretti, Patrick Traynor, Patrick McDanie...
SIGMOD
2010
ACM
227views Database» more  SIGMOD 2010»
14 years 27 days ago
SecureBlox: customizable secure distributed data processing
We present SecureBlox, a declarative system that unifies a distributed query processor with a security policy framework. SecureBlox decouples security concerns from system speci...
William R. Marczak, Shan Shan Huang, Martin Braven...
JTAER
2006
100views more  JTAER 2006»
13 years 8 months ago
A Model for Improving e-Security in Australian Universities
As universities seek to adopt increased e-business, e-commerce and e-learning initiates, the overall approach taken for security management within the organisation plays an increa...
Lauren May, Tim Lane