Sciweavers

1128 search results - page 111 / 226
» Structuring anonymity metrics
Sort
View
INFOCOM
2008
IEEE
14 years 4 months ago
A Novel Quantitative Approach For Measuring Network Security
—Evaluation of network security is an essential step in securing any network. This evaluation can help security professionals in making optimal decisions about how to design secu...
Mohammad Salim Ahmed, Ehab Al-Shaer, Latifur Khan
AMIRE
2005
Springer
198views Robotics» more  AMIRE 2005»
14 years 3 months ago
Extending the Temporal Horizon of Autonomous Robots
Abstract. We introduce mathematically rigorous metrics on agent experiences having various temporal horizons. Sensorimotor variables accessible to the agent are treated as informat...
Chrystopher L. Nehaniv, Naeem Assif Mirza, Kerstin...
BTW
2007
Springer
183views Database» more  BTW 2007»
14 years 2 months ago
Efficient Reverse k-Nearest Neighbor Estimation
: The reverse k-nearest neighbor (RkNN) problem, i.e. finding all objects in a data set the k-nearest neighbors of which include a specified query object, has received increasing a...
Elke Achtert, Christian Böhm, Peer Kröge...
SIGSOFT
2010
ACM
13 years 8 months ago
Organizational volatility and its effects on software defects
The key premise of an organization is to allow more efficient production, including production of high quality software. To achieve that, an organization defines roles and reporti...
Audris Mockus
IDTRUST
2010
ACM
14 years 5 months ago
Computational techniques for increasing PKI policy comprehension by human analysts
Natural-language policies found in X.509 PKI describe an organization’s stated policy as a set of requirements for trust. The widespread use of X.509 underscores the importance ...
Gabriel A. Weaver, Scott A. Rea, Sean W. Smith