Sciweavers

1995 search results - page 33 / 399
» Belief in Information Flow
Sort
View
NIPS
2001
13 years 10 months ago
Information-Geometrical Significance of Sparsity in Gallager Codes
We report a result of perturbation analysis on decoding error of the belief propagation decoder for Gallager codes. The analysis is based on information geometry, and it shows tha...
Toshiyuki Tanaka, Shiro Ikeda, Shun-ichi Amari
ACSAC
2004
IEEE
14 years 18 days ago
Designing Good Deceptions in Defense of Information Systems
Since attackers trust computer systems to tell them the truth, it may be effective for those systems to lie or mislead. This could waste the attacker's resources while permit...
Neil C. Rowe
APNOMS
2007
Springer
14 years 25 days ago
End-to-End Flow Monitoring with IPFIX
End-to-End (E2E) flow monitoring is useful for observing performance of networks such as throughput, loss rate, and jitter. Typically, E2E flow monitoring is carried out at end hos...
Byungjoon Lee, Hyeongu Son, Seunghyun Yoon, Youngs...
WWW
2007
ACM
14 years 9 months ago
Information flow modeling based on diffusion rate for prediction and ranking
Information flows in a network where individuals influence each other. The diffusion rate captures how efficiently the information can diffuse among the users in the network. We p...
Xiaodan Song, Yun Chi, Koji Hino, Belle L. Tseng
STVR
2010
99views more  STVR 2010»
13 years 7 months ago
Fault localization based on information flow coverage
Failures triggered by hard to debug defects usually involve complex interactions between many program elements. We hypothesize that information flows present a good model for such ...
Wes Masri