Sciweavers

1995 search results - page 216 / 399
» Belief in Information Flow
Sort
View
BILDMED
2009
230views Algorithms» more  BILDMED 2009»
13 years 12 months ago
Analysis of 2D Phase Contrast MRI in Renal Arteries by Self Organizing Maps
We present an approach based on self organizing maps to segment renal arteries from 2D PC Cine MR images to measure blood velocity and flow. Such information are important in gradi...
Frank Zöllner, Lothar R. Schad
SIAMAM
2008
91views more  SIAMAM 2008»
13 years 10 months ago
A Fluid Dynamic Model for Telecommunication Networks with Sources and Destinations
This paper proposes a macroscopic fluid dynamic model dealing with the flows of information on a telecommunication network with sources and destinations. The model consists of a co...
Ciro D'Apice, Rosanna Manzo, Benedetto Piccoli
JCS
2002
132views more  JCS 2002»
13 years 10 months ago
Checking Secure Interactions of Smart Card Applets: Extended Version
Abstract. This paper presents an approach enabling a smart card issuer to verify that a new applet securely interacts with already downloaded applets. A security policy has been de...
Pierre Bieber, Jacques Cazin, Pierre Girard, Jean-...
USS
2008
14 years 1 months ago
Proactive Surge Protection: A Defense Mechanism for Bandwidth-Based Attacks
Large-scale bandwidth-based distributed denial-of-service (DDoS) attacks can quickly knock out substantial parts of a network before reactive defenses can respond. Even traffic flo...
Jerry Chi-Yuan Chou, Bill Lin, Subhabrata Sen, Oli...
CSFW
1999
IEEE
14 years 3 months ago
Process Algebra and Non-Interference
The information security community has long debated the exact definition of the term `security'. Even if we focus on the more modest notion of confidentiality the precise def...
Peter Y. A. Ryan, Steve A. Schneider