Sciweavers

1407 search results - page 128 / 282
» Systems Theory Model for Information Security
Sort
View
CEC
2005
IEEE
14 years 1 months ago
Sensorimotor experience and its metrics: informational geometry and the temporal horizon
Abstract- We introduce metrics on sensorimotor experience at various temporal scales based on informationtheory. Sensorimotor variables through which the experience of an agent fl...
Chrystopher L. Nehaniv
SACMAT
2005
ACM
14 years 1 months ago
Generalized XML security views
We investigate a generalization of the notion of XML security view introduced by Stoica and Farkas [17] and later refined by Fan et al. [8]. The model consists of access control ...
Gabriel M. Kuper, Fabio Massacci, Nataliya Rassadk...
CORR
2010
Springer
176views Education» more  CORR 2010»
13 years 7 months ago
Competitive Spectrum Management with Incomplete Information
An important issue in wireless communication is the interaction between selfish and independent wireless communication systems in the same frequency band. Due to the selfish natur...
Yair Noam, Amir Leshem, Hagit Messer
CRV
2005
IEEE
305views Robotics» more  CRV 2005»
14 years 1 months ago
3D Model-Assisted Face Recognition in Video
Face recognition in video has gained wide attention as a covert method for surveillance to enhance security in a variety of application domains (e.g., airports). A video contains ...
Unsang Park, Hong Chen, Anil K. Jain
ISLPED
2010
ACM
170views Hardware» more  ISLPED 2010»
13 years 8 months ago
Low-power sub-threshold design of secure physical unclonable functions
The unique and unpredictable nature of silicon enables the use of physical unclonable functions (PUFs) for chip identification and authentication. Since the function of PUFs depen...
Lang Lin, Daniel E. Holcomb, Dilip Kumar Krishnapp...