Sciweavers

2060 search results - page 333 / 412
» The Composition of Event-B Models
Sort
View
CLEAR
2007
Springer
271views Biometrics» more  CLEAR 2007»
15 years 10 months ago
The AIT Multimodal Person Identification System for CLEAR 2007
This paper presents the person identification system developed at Athens Information Technology and its performance in the CLEAR 2007 evaluations. The system operates on the audiov...
Andreas Stergiou, Aristodemos Pnevmatikakis, Lazar...
161
Voted
CRYPTO
2007
Springer
162views Cryptology» more  CRYPTO 2007»
15 years 10 months ago
Universally-Composable Two-Party Computation in Two Rounds
Round complexity is a central measure of efficiency, and characterizing the round complexity of various cryptographic tasks is of both theoretical and practical importance. We show...
Omer Horvitz, Jonathan Katz
ICSOC
2007
Springer
15 years 10 months ago
Towards Self-management in Service-Oriented Computing with Modes
Abstract. A self-managed system is both self-assembling and selfhealing. Service-oriented Computing (SoC) architectures, such as a Web Services Architecture (WS-A) illustrate a hig...
Howard Foster, Sebastián Uchitel, Jeff Kram...
MIDDLEWARE
2007
Springer
15 years 10 months ago
A Cost-Effective Distributed File Service with QoS Guarantees
Large-scale, value-added Internet services composed of independent cooperating or competing services will soon become common place. Several groups have addressed the performance, c...
Kien Le, Ricardo Bianchini, Thu D. Nguyen
RAID
2007
Springer
15 years 10 months ago
Exploiting Execution Context for the Detection of Anomalous System Calls
Attacks against privileged applications can be detected by analyzing the stream of system calls issued during process execution. In the last few years, several approaches have been...
Darren Mutz, William K. Robertson, Giovanni Vigna,...