Run-time selection of security algorithms for networked devices.
Antonio Vincenzo TaddeoAlberto FerrantePublished in: Q2SWinet (2009)
Keyphrases
- recently developed
- data structure
- learning algorithm
- orders of magnitude
- benchmark datasets
- theoretical analysis
- information security
- access control
- computationally efficient
- run times
- database
- statistical databases
- times faster
- machine learning algorithms
- operating system
- worst case
- computational cost
- objective function
- information systems
- computer vision
- data mining
- real time