Sciweavers

1349 search results - page 207 / 270
» Towards a theory of events
Sort
View
PROVSEC
2007
Springer
14 years 1 months ago
Formal Proof of Provable Security by Game-Playing in a Proof Assistant
Game-playing is an approach to write security proofs that are easy to verify. In this approach, security definitions and intractable problems are written as programs called games ...
Reynald Affeldt, Miki Tanaka, Nicolas Marti
GLOBECOM
2006
IEEE
14 years 1 months ago
Hierarchical Iterative Algorithm for a Coupled Constrained OSNR Nash Game
— This paper develops a hierarchical iterative OSNR algorithm based on a game theory framework. A Nash game is formulated between channels with channel utility related to maximiz...
Lacra Pavel
HICSS
2006
IEEE
198views Biometrics» more  HICSS 2006»
14 years 1 months ago
Modeling Initial and Repeat Online Trust in B2C E-Commerce
Prior research has demonstrated that the degrees and impact of customer trust on purchase intentions change with online experience. While online trust research has incorporated an...
Wei-Chang Kong, Yu-Ting Caisy Hung
INFOSCALE
2006
ACM
14 years 1 months ago
A library of constructive skeletons for sequential style of parallel programming
Abstract— With the increasing popularity of parallel programming environments such as PC clusters, more and more sequential programmers, with little knowledge about parallel arch...
Kiminori Matsuzaki, Hideya Iwasaki, Kento Emoto, Z...
HICSS
2005
IEEE
188views Biometrics» more  HICSS 2005»
14 years 1 months ago
Developing Group Decision Support Systems for Deception Detection
Achieving information assurance and security is a complex and challenging task, which is crucial from national and personal security point of views. Research in detecting deceptiv...
Amit V. Deokar, Therani Madhusudan