Sciweavers

530 search results - page 95 / 106
» Security Analysis of Open Building Automation Systems
Sort
View
DAC
2002
ACM
14 years 9 months ago
HiPRIME: hierarchical and passivity reserved interconnect macromodeling engine for RLKC power delivery
This paper proposes a general hierarchical analysis methodology, HiPRIME, to efficiently analyze RLKC power delivery systems. After partitioning the circuits into blocks, we devel...
Yahong Cao, Yu-Min Lee, Tsung-Hao Chen, Charlie Ch...
NSPW
2004
ACM
14 years 1 months ago
The role of suspicion in model-based intrusion detection
We argue in favor of the explicit inclusion of suspicion as a concrete concept to be used in the analysis of audit data in order to guide the search for evidence of misuse. Our ap...
Timothy Hollebeek, Rand Waltzman
ICOODB
2009
246views Database» more  ICOODB 2009»
13 years 6 months ago
Compiler Plugins Can Handle Nested Languages: AST-Level Expansion of LINQ Queries for Java
The integration of database and programming languages is made difficult by the different data models and type systems prevalent in each field. Functional-object query languages con...
Miguel Garcia
ERCIMDL
2005
Springer
80views Education» more  ERCIMDL 2005»
14 years 2 months ago
Strategies for Reprocessing Aggregated Metadata
The OAI protocol facilitates the aggregation of large numbers of heterogeneous metadata records. In order to make harvested records useable in the context of an OAI service provide...
Muriel Foulonneau, Timothy W. Cole
CRYPTO
1993
Springer
137views Cryptology» more  CRYPTO 1993»
14 years 18 days ago
Broadcast Encryption
A broadcast encryption scheme allows the sender to securely distribute data to a dynamically changing set of users over an insecure channel. One of the most challenging settings fo...
Amos Fiat, Moni Naor