Sciweavers

2028 search results - page 138 / 406
» Deriving Relation Keys from XML Keys
Sort
View
SAC
2009
ACM
15 years 11 months ago
Multi-step attack modelling and simulation (MsAMS) framework based on mobile ambients
Attackers take advantage of any security breach to penetrate an organisation perimeter and exploit hosts as stepping stones to reach valuable assets, deeper in the network. The exp...
Virginia N. L. Franqueira, Raul H. C. Lopes, Pasca...
HOST
2009
IEEE
15 years 8 months ago
Reconfigurable Physical Unclonable Functions -- Enabling Technology for Tamper-Resistant Storage
A PUF or Physical Unclonable Function is a function that is embodied in a physical structure that consists of many random uncontrollable components which originate from process var...
Klaus Kursawe, Ahmad-Reza Sadeghi, Dries Schelleke...
SIGGRAPH
1994
ACM
15 years 8 months ago
The irradiance Jacobian for partially occluded polyhedral sources
The irradiance at a point on a surface due to a polyhedral source of uniform brightness is given by a well-known analytic formula. In this paper we derive the corresponding analyt...
James Arvo
ICML
2010
IEEE
15 years 5 months ago
Nonparametric Return Distribution Approximation for Reinforcement Learning
Standard Reinforcement Learning (RL) aims to optimize decision-making rules in terms of the expected return. However, especially for risk-management purposes, other criteria such ...
Tetsuro Morimura, Masashi Sugiyama, Hisashi Kashim...
IJAR
2010
91views more  IJAR 2010»
15 years 2 months ago
Logical and algorithmic properties of stable conditional independence
The logical and algorithmic properties of stable conditional independence (CI) as an alternative structural representation of conditional independence information are investigated...
Mathias Niepert, Dirk Van Gucht, Marc Gyssens