Sciweavers

1012 search results - page 130 / 203
» What Robots Can Do
Sort
View
NORDSEC
2009
Springer
15 years 11 months ago
Towards Practical Enforcement Theories
Runtime enforcement is a common mechanism for ensuring that program executions adhere to constraints specified by a security policy. It is based on two simple ideas: the enforceme...
Nataliia Bielova, Fabio Massacci, Andrea Michelett...
SACRYPT
2009
Springer
130views Cryptology» more  SACRYPT 2009»
15 years 11 months ago
Format-Preserving Encryption
Format-preserving encryption (FPE) encrypts a plaintext of some specified format into a ciphertext of identical format—for example, encrypting a valid credit-card number into a ...
Mihir Bellare, Thomas Ristenpart, Phillip Rogaway,...
SIBGRAPI
2007
IEEE
15 years 11 months ago
Seed-Relative Segmentation Robustness of Watershed and Fuzzy Connectedness Approaches
This paper analyzes the robustness issue in three segmentation approaches: the iterative relative fuzzy object extraction, the watershed transforms (WT) by image foresting transfo...
Romaric Audigier, Roberto de Alencar Lotufo
PERVASIVE
2007
Springer
15 years 10 months ago
Operating Appliances with Mobile Phones - Strengths and Limits of a Universal Interaction Device
Abstract. Mobile phones are increasingly becoming ubiquitous computational devices that are almost always available, individually adaptable, and nearly universally connectable (usi...
Christof Roduner, Marc Langheinrich, Christian Flo...
TARK
2007
Springer
15 years 10 months ago
Alternating-time temporal logics with irrevocable strategies
In Alternating-time Temporal Logic (atl), one can express statements about the strategic ability of an agent (or a coalition of agents) to achieve a goal φ such as: “agent i ca...
Thomas Ågotnes, Valentin Goranko, Wojciech J...