Sciweavers

1028 search results - page 69 / 206
» Using Attack Graphs to Design Systems
Sort
View
HYBRID
2010
Springer
14 years 3 months ago
Distributed Kalman Filter algorithms for self-localization of mobile devices
This paper addresses the problem of self localization of mobile devices. In particular, each device combines noisy measurements of its absolute position with distance measurements...
Anne-Kathrin Hess, Anders Rantzer
CIMCA
2006
IEEE
14 years 4 months ago
Probabilistic, Multi-staged Interpretation of Spoken Utterances
Abstract. We describe Scusi?, a multi-stage, spoken language interpretation mechanism designed to be part of a robot-mounted dialogue system. Scusi?’s interpretation process maps...
Ingrid Zukerman, Michael Niemann, Sarah George
CRYPTO
2011
Springer
191views Cryptology» more  CRYPTO 2011»
12 years 10 months ago
Analyzing Blockwise Lattice Algorithms Using Dynamical Systems
Strong lattice reduction is the key element for most attacks against lattice-based cryptosystems. Between the strongest but impractical HKZ reduction and the weak but fast LLL redu...
Guillaume Hanrot, Xavier Pujol, Damien Stehl&eacut...
IJSN
2008
147views more  IJSN 2008»
13 years 10 months ago
Formal modelling and analysis of XML firewall for service-oriented systems
: Firewalls have been designed as a major component to protect a network or a server from being attacked. However, due to their emphasis on packet filtering rather than verifying u...
Haiping Xu, Mihir M. Ayachit, Abhinay Reddyreddy
DEBS
2007
ACM
14 years 2 months ago
Towards a theory of events
Event-driven systems are used in a wide range of applications such as responding to missile attacks, interdicting potential terrorists, exploiting arbitrage opportunities and resp...
K. Mani Chandy, Michel Charpentier, Agostino Cappo...