Sciweavers

271 search results - page 46 / 55
» From Trust to Dependability through Risk Analysis
Sort
View
INFOCOM
2011
IEEE
12 years 11 months ago
A robust optimization approach to backup network design with random failures
—This paper presents a scheme in which a dedicated backup network is designed to provide protection from random link failures. Upon a link failure in the primary network, traffi...
Matthew Johnston, Hyang-Won Lee, Eytan Modiano
ICCV
2003
IEEE
14 years 9 months ago
Conditional Feature Sensitivity: A Unifying View on Active Recognition and Feature Selection
The objective of active recognition is to iteratively collect the next "best" measurements (e.g., camera angles or viewpoints), to maximally reduce ambiguities in recogn...
Xiang Sean Zhou, Dorin Comaniciu, Arun Krishnan
HICSS
2009
IEEE
111views Biometrics» more  HICSS 2009»
14 years 2 months ago
The Impact of Social Support of Guild Members and Psychological Factors on Flow and Game Loyalty in MMORPG
The objective of this study is to identify the relationships in which social support influences flow and game loyalty through character control, character identity, guild identity...
Juseon Kang, Ilsang Ko, Yunjung Ko
ICISS
2007
Springer
14 years 1 months ago
Towards Automated Privilege Separation
Applications are subject to threat from a number of attack vectors, and limiting their attack surface is vital. By using privilege separation to constrain application access to pro...
Dhananjay Bapat, Kevin R. B. Butler, Patrick Drew ...
MKM
2004
Springer
14 years 1 months ago
A Graph-Based Approach Towards Discerning Inherent Structures in a Digital Library of Formal Mathematics
As the amount of online formal mathematical content grows, for example through active efforts such as the Mathweb [21], MOWGLI [4], Formal Digital Library, or FDL [1], and others, ...
Lori Lorigo, Jon M. Kleinberg, Richard Eaton, Robe...