Sciweavers

6555 search results - page 134 / 1311
» Secure attribute-based systems
Sort
View
ISMIR
2004
Springer
176views Music» more  ISMIR 2004»
15 years 7 months ago
The International Music Information Retrieval Systems Evaluation Laboratory: Governance, Access and Security
The IMIRSEL (International Music Information Retrieval Systems Evaluation Laboratory) project provides an unprecedented platform for evaluating Music Information Retrieval (MIR) a...
J. Stephen Downie, Joe Futrelle, David K. Tcheng
HYBRID
2009
Springer
15 years 9 months ago
Safe and Secure Networked Control Systems under Denial-of-Service Attacks
Abstract. We consider the problem of security constrained optimal control for discrete-time, linear dynamical systems in which control and measurement packets are transmitted over ...
Saurabh Amin, Alvaro A. Cárdenas, Shankar S...
124
Voted
NDSS
2003
IEEE
15 years 7 months ago
Traps and Pitfalls: Practical Problems in System Call Interposition Based Security Tools
System call interposition is a powerful method for regulating and monitoring application behavior. In recent years, a wide variety of security tools have been developed that use t...
Tal Garfinkel
ICSAP
2009
15 years 2 days ago
Omnidirectional Surveillance System for Digital Home Security
This paper proposed an efficient omnidirectional surveillance system for digital home security. In this surveillance system, the omnidirectional scenes in a room, kitchen, car porc...
Wai Kit Wong, Joanne Tze Yen Liew, Chu Kiong Loo, ...
97
Voted
WSC
2008
15 years 4 months ago
Mental simulation for creating realistic behavior in physical security systems simulation
Mental simulation is proposed by cognitive psychologists as a candidate to model the human reasoning process. In this paper, we propose a methodology that models mental simulation...
Volkan Ustun, Jeffrey S. Smith