Filters








3,880 Hits in 5.1 sec

Analysing Privacy-Type Properties in Cryptographic Protocols (Invited Talk)

Stéphanie Delaune, Michael Wagner
2018 International Conference on Rewriting Techniques and Applications  
For example, passports are no more pure paper documents. Instead, they contain a chip that stores additional information such as pictures and fingerprints of their holder.  ...  Privacy-type security properties (e.g. anonymity, unlinkability, vote secrecy, . . . ) are expressed relying on a notion of behavioural equivalence, and are actually more difficult to analyse than confidentiality  ...  For example, Alice's identity remains private if an attacker cannot distinguish a session where Alice is talking from a session where Bob is talking.  ... 
doi:10.4230/lipics.fscd.2018.1 dblp:conf/rta/Delaune18 fatcat:mbzxlhqg5bdoxcjzxegydzpsba

Invited Talk: Re-Engineering Computing with Neuro-Inspired Learning: Devices, Circuits, and Systems

Priyadarshini Panda, Kaushik Roy
2020 2020 33rd International Conference on VLSI Design and 2020 19th International Conference on Embedded Systems (VLSID)  
In this presentation, we will discuss our work on spintronic device structures consisting of single-domain/domain-wall motion based devices for mimicking neuronal and synaptic units.  ...  that is hinged on measurements of highly sensitive, and specific disease biomarkers.  ...  ), for both the embedded and high-performance computing domains.  ... 
doi:10.1109/vlsid49098.2020.00017 dblp:conf/vlsid/Panda020 fatcat:tvsoqomvynaxtkry62vhni4ura

Business Visibility with Web Services: Making Sense of Your IT Operations and of What They Mean To You (Invited talk)

Fabio Casati, Vijay Machiraju
2003 International Conference on Advanced Information Systems Engineering  
Establishing this correlation enables application management to become a tool for managing not only the IT infrastructure, but also the business.  ...  One of the most significant and least explored is the key role that Web services can play in application management.  ...  Furthermore, these specifications form the basis for a "management data model" that helps organize the collected instrumentation data.  ... 
dblp:conf/caise/CasatiM03 fatcat:ipput33ifnghxduh3ivzflaxve

Analogical reasoning in uncovering the meaning of digital-technology terms: the case of backdoor

Inna V. Skrynnikova
2020 Journal of Computer-Assisted Linguistic Research  
Dwelling on the divergent interpretations of a backdoor, it uncovers the potential of metaphor to serve both as an interpretative mechanism and as a framing tool in the ongoing digital technologies discourse  ...  The paper proposes a qualitatively new metaphor-facilitated mode of interpreting cybersecurity vulnerabilities based on MetaNet deep semantic metaphor analysis and outlines the merits of this hierarchically  ...  Still, they are not without flaws when one has to address specific questions about the functions of metaphor in a particular language context or cognitive and social domain (David and Matlock 2018) .  ... 
doi:10.4995/jclr.2020.12921 fatcat:n55m7sesv5h5dg6neo5bzsdujm

Secure Inclusion of Phones Into Online E-meetings [chapter]

Peter Parnes
2003 Lecture Notes in Computer Science  
It is also shows how an e-meeting portal is used for simple inclusion of phones into e-meetings even if the inviting client is behind a NAT gateway or a firewall.  ...  Online Internet based e-meetings for synchronous communication is becoming more and more common and the need for secure communication is a strong requirement from both corporate and private users.  ...  for comments, suggestions, and feedback This work is supported by the Centre for Distance-spanning Technology (CDT) under the VITAL project, Marratech AB, and the Swedish Research Institute for Information  ... 
doi:10.1007/978-3-540-39404-4_30 fatcat:u3wnkogr6nhedfr5csakiyon6a

The Association for the Advancement of Artificial Intelligence 2020 Workshop Program

Grace Bang, Guy Barash, Ryan Bea, Jacques Cali, Mauricio Castillo-Effen, Xin Chen, Niyati Chhaya, Rachel Cummings, Rohan Dhoopar, Sebastijan Dumanci, Huáscar Espinoza, Eitan Farchi (+29 others)
2020 The AI Magazine  
The Association for the Advancement of Artificial Intelligence 2020 Workshop Program included twenty-three workshops covering a wide range of topics in artificial intelligence.  ...  solutions based on homomorphic encryption and multiparty computation to address such challenges.  ...  The workshop included two invited talks on these research themes.  ... 
doi:10.1609/aimag.v41i4.7398 fatcat:r6bw77vy4zgmrbgyuvsjs5knta

Web Application Security (Dagstuhl Seminar 12401)

Lieven Desmet, Martin Johns, Benjamin Livshits, Andrei Sabelfeld, Marc Herbstritt
2013 Dagstuhl Reports  
As web application security is a broad research domain, a diverse set of recent research results was presented during the talks, covering the web security vulnerability landscape, information-flow control  ...  The seminar had a well-filled program, with 3 keynotes, 28 research talks, and 15 5-minute talks.  ...  Dependent types for javascript. In Proceedings of the ACM international conference on Object oriented programming systems languages and applications, OOPSLA '12, New '10, pages 126-150.  ... 
doi:10.4230/dagrep.2.10.1 dblp:journals/dagstuhl-reports/DesmetJLS12 fatcat:qkke5ohg6fcblf5prpes3a4znm

Cover

2020 2020 International Conference on Advanced Information Technologies (ICAIT)  
A new model to learn given data is devised, and then its application to a specific field or a specific technique is discussed.  ...  Invited Talk 2 Tetsuya Shimamura has received IEEE Pacific Rim Conference on Communications, Computers and Signal Processing, Gold Paper Award, in 2012, WSEAS International Conference on Multimedia Systems  ... 
doi:10.1109/icait51105.2020.9261797 fatcat:2ayhw5qwjjfidmuknsal7tij64

Report from the first workshop on geo sensor networks

S. Nittel, M. Worboys, A. Stefanidis, I. Cruz, M. Egenhofer, D. Goldin, A. Howard, A. Labrinidis, S. Madden, A. Voisard
2004 SIGMOD record  
Data reliability and quality is expected as a result of the large number of sensors deployed for a specific task.  ...  One strategy is to minimize data acquisition, i.e. to instruct sensor nodes to only generate the data that is necessary for a query, or to only forward new values that are within a significant threshold  ... 
doi:10.1145/974121.974146 fatcat:pih2cqgy5jgvrbunrp2irhzyyq

Chatbot using Zomato API

Kushagar Aghi
2021 International Journal for Research in Applied Science and Engineering Technology  
One such bot is being designed in this project, where data about restaurants on the basis of some inputs are collected. Using this data, chatbot is trained to answer the queries.  ...  Chatbots are program that interact with humans using natural language like English.  ...  INTRODUCTION Chatbots are computer programs, it maintains a conversation with a user in Natural language, understand the user's Intent and send responses based on the user intent (NLP) i.e answer to  ... 
doi:10.22214/ijraset.2021.34944 fatcat:ftimuyhqxfaojd6gegrnkngv4y

ITtalks: a case study in the Semantic Web and DAML+OIL

R.S. Cost, T. Finin, A. Joshi, Yun Peng, C. Nicholas, I. Soboroff, H. Chen, L. Kagal, F. Perich, Youyong Zou, S. Tolia
2002 IEEE Intelligent Systems  
As part of the University of Maryland, Baltimore County's role in the DAML Program, we constructed a fielded application, ITtalks, which facilitates user and agent interaction for locating talks on information  ...  The DAML Program aims to develop a Semantic Web markup language that provides sufficient rules for ontology development and that supports intelligent agents and other applications. 1,2 (For more information  ...  Finding a talk of potential interest to a colleague, Jim takes advantage of the invitation feature, which lets him send an invitational email to any of his friends for any of the listed talks.  ... 
doi:10.1109/5254.988447 fatcat:gy7uimzwxnh2xptgz3n7u4c6j4

Security and Privacy in Unified Communication

Thomas Reisinger, Isabel Wagner, Eerke Albert Boiten
2023 ACM Computing Surveys  
While confidentiality in communication channels is generally well protected through encryption, other privacy properties are mostly lacking on UC platforms.  ...  This article provides a comprehensive survey of security and privacy in Unified Communication (UC). We systematically analyze security and privacy threats and mitigations in a generic UC scenario.  ...  To join a meeting, external participants need to be included in the calendar invite, be invited by in-domain participants, or submit a request to join the meeting which must be accepted by an in-domain  ... 
doi:10.1145/3498335 fatcat:hcqscu77azhx3pm3nxxnhnqmxi

Creative Informatics Research Ethics Overview

Chris Elsden, Susan Lechelt, Pip Thornton, Melissa Terras
2020 Zenodo  
This document is a summary of the Research Ethics audit that we have applied for and been granted by Edinburgh College of Art (ECA), as part of the AHRC Creative Informatics project (https://creativeinformatics.org  ...  itself in case of any harms that may result from a research project.  ...  Specifically: Data that includes your personally identifiable information might be: • On a secure encrypted hard drive for up to ten years • On a secure University of Edinburgh data management portal for  ... 
doi:10.5281/zenodo.3956029 fatcat:xlrnipv3xvaibgn3ipwl42jky4

Creative Informatics Research Ethics Overview

Chris Elsden, Susan Lechelt, Pip Thornton, Melissa Terras
2020 Zenodo  
This document is a summary of the Research Ethics audit that we have applied for and been granted by Edinburgh College of Art (ECA), as part of the AHRC Creative Informatics project (https://creativeinformatics.org  ...  itself in case of any harms that may result from a research project.  ...  Specifically: Data that includes your personally identifiable information might be: • On a secure encrypted hard drive for up to ten years • On a secure University of Edinburgh data management portal for  ... 
doi:10.5281/zenodo.3956529 fatcat:6s7auc6wlvhc3mcgdelkta2adi

Creative Informatics Research Ethics Overview

Chris Elsden, Susan Lechelt, Pip Thornton, Melissa Terras
2020 Zenodo  
This document is a summary of the Research Ethics audit that we have applied for and been granted by Edinburgh College of Art (ECA), as part of the AHRC Creative Informatics project (https://creativeinformatics.org  ...  itself in case of any harms that may result from a research project.  ...  Specifically: Data that includes your personally identifiable information might be: • On a secure encrypted hard drive for up to ten years • On a secure University of Edinburgh data management portal for  ... 
doi:10.5281/zenodo.3956028 fatcat:gv2rvlhbe5g7nm5tqftf2o4fcu
« Previous Showing results 1 — 15 out of 3,880 results