Sciweavers

211 search results - page 31 / 43
» Towards Security Evaluation Based on Evidence Collection
Sort
View
ICC
2007
IEEE
186views Communications» more  ICC 2007»
14 years 1 months ago
An Efficient Cluster-Based Proactive Secret Share Update Scheme for Mobile Ad Hoc Networks
– When implementing public key security ser- easy for an adversary to collect data and attack. To solve this vices in mobile ad hoc networks (MANETs), multiple problem, the distr...
Ying Dong, Ai Fen Sui, Siu-Ming Yiu, Victor O. K. ...
AGENTS
1998
Springer
13 years 11 months ago
Competitive Scenarios for Heterogeneous Trading Agents
We present a framework for de ning trading scenarios based on sh market auctions. In these scenarios, agents of arbitrary complexity can participate in electronic auctions under ...
Juan A. Rodríguez-Aguilar, Francisco J. Mar...
ICMI
2009
Springer
105views Biometrics» more  ICMI 2009»
14 years 2 months ago
Grounding spatial prepositions for video search
Spatial language video retrieval is an important real-world problem that forms a test bed for evaluating semantic structures for natural language descriptions of motion on natural...
Stefanie Tellex, Deb Roy
CHI
2008
ACM
14 years 7 months ago
The Georgia Tech aware home
The Aware Home Research Initiative (AHRI) at Georgia Tech is devoted to the multidisciplinary exploration of emerging technologies and services based in the home. Starting in 1998...
Julie A. Kientz, Shwetak N. Patel, Brian Jones, Ed...
ISI
2005
Springer
14 years 29 days ago
An Ontological Approach to the Document Access Problem of Insider Threat
Verification of legitimate access of documents, which is one aspect of the umbrella of problems in the Insider Threat category, is a challenging problem. This paper describes the r...
Boanerges Aleman-Meza, Phillip Burns, Matthew Eave...