Sciweavers

549 search results - page 102 / 110
» Belief-Based Risk Analysis
Sort
View
MICCAI
2009
Springer
14 years 5 months ago
A Statistical Model of Right Ventricle in Tetralogy of Fallot for Prediction of Remodelling and Therapy Planning
Tetralogy of Fallot (ToF) is a severe congenital heart disease that mainly affects the right ventricle (RV). It requires surgical repair early in infancy. Chronic regurgitations ma...
Tommaso Mansi, Stanley Durrleman, Boris Bernhardt,...
EUROSYS
2007
ACM
14 years 5 months ago
Competitive prefetching for concurrent sequential I/O
During concurrent I/O workloads, sequential access to one I/O stream can be interrupted by accesses to other streams in the system. Frequent switching between multiple sequential ...
Chuanpeng Li, Kai Shen, Athanasios E. Papathanasio...
TMA
2010
Springer
314views Management» more  TMA 2010»
14 years 3 months ago
On the Use of TCP Passive Measurements for Anomaly Detection: A Case Study from an Operational 3G Network
In this work we discuss the use of passive measurements of TCP performance indicators in support of network operation and troubleshooting, presenting a case-study from a real 3G ce...
Peter Romirer-Maierhofer, Angelo Coluccia, Tobias ...
ICST
2009
IEEE
14 years 3 months ago
Predicting Attack-prone Components
GEGICK, MICHAEL CHARLES. Predicting Attack-prone Components with Source Code Static Analyzers. (Under the direction of Laurie Williams). No single vulnerability detection techniqu...
Michael Gegick, Pete Rotella, Laurie A. Williams
ATAL
2009
Springer
14 years 3 months ago
Computing optimal randomized resource allocations for massive security games
Predictable allocations of security resources such as police officers, canine units, or checkpoints are vulnerable to exploitation by attackers. Recent work has applied game-theo...
Christopher Kiekintveld, Manish Jain, Jason Tsai, ...