Sciweavers

1770 search results - page 129 / 354
» Writing requirements in computer security
Sort
View
OORASE
1999
Springer
14 years 2 months ago
OpenJava: A Class-Based Macro System for Java
This paper presents OpenJava, which is a macro system that we have developed for Java. With traditional macro systems designed for non object-oriented languages, it is difficult to...
Michiaki Tatsubori, Shigeru Chiba, Kozo Itano, Mar...
NIPS
1994
13 years 11 months ago
Recognizing Handwritten Digits Using Mixtures of Linear Models
We construct a mixture of locally linear generative models of a collection of pixel-based images of digits, and use them for recognition. Different models of a given digit are use...
Geoffrey E. Hinton, Michael Revow, Peter Dayan
OTM
2010
Springer
13 years 8 months ago
Towards Using Semantic Decision Tables for Organizing Data Semantics
In the ITEA2 Do-It-Yourself Smart Experiences project (DIY-SE), we are required to design an ontology-based ambient computing environment to support users to DIY their personalized...
Yan Tang
PKC
2012
Springer
235views Cryptology» more  PKC 2012»
12 years 18 days ago
Improved Security for Linearly Homomorphic Signatures: A Generic Framework
ded abstract of this work will appear in Public Key Cryptography — PKC 2012. This is the full version. We propose a general framework that converts (ordinary) signature schemes ...
David Mandell Freeman
FASE
2008
Springer
13 years 12 months ago
Automated Analysis of Permission-Based Security Using UMLsec
Abstract. To guarantee the security of computer systems, it is necessary to define security permissions to restrict the access to the systems' resources. These permissions enf...
Jan Jürjens, Jörg Schreck, Yijun Yu