Sciweavers

2610 search results - page 75 / 522
» Computational Probabilistic Non-interference
Sort
View
HUC
2004
Springer
14 years 2 months ago
Particle Filters for Location Estimation in Ubiquitous Computing: A Case Study
Location estimation is an important part of many ubiquitous computing systems. Particle filters are simulation-based probabilistic approximations which the robotics community has ...
Jeffrey Hightower, Gaetano Borriello
ISMIS
2005
Springer
14 years 2 months ago
Anomaly Detection in Computer Security and an Application to File System Accesses
Abstract. We present an overview of anomaly detection used in computer security, and provide a detailed example of a host-based Intrusion Detection System that monitors file syste...
Salvatore J. Stolfo, Shlomo Hershkop, Linh H. Bui,...
ESOP
2005
Springer
14 years 2 months ago
Computationally Sound, Automated Proofs for Security Protocols
Since the 1980s, two approaches have been developed for analyzing security protocols. One of the approaches relies on a computational model that considers issues of complexity and ...
Véronique Cortier, Bogdan Warinschi
GLVLSI
2009
IEEE
146views VLSI» more  GLVLSI 2009»
14 years 23 days ago
A reconfigurable stochastic architecture for highly reliable computing
Mounting concerns over variability, defects and noise motivate a new approach for integrated circuits: the design of stochastic logic, that is to say, digital circuitry that opera...
Xin Li, Weikang Qian, Marc D. Riedel, Kia Bazargan...
CARS
2003
13 years 10 months ago
Does incorrect computer prompting affect human decision making? A case study in mammography
The goal of the data collection and analyses described in this paper was to investigate the effects of incorrect output from a CAD tool on the reliability of the decisions of its ...
Eugenio Alberdi, Andrey Povyakalo, Lorenzo Strigin...