Sciweavers

274 search results - page 32 / 55
» Improving vulnerability discovery models
Sort
View
INFOCOM
2010
IEEE
13 years 6 months ago
Refresh: Weak Privacy Model for RFID Systems
—Privacy-Preserving Authentication (PPA) is crucial for Radio Frequency Identifcation (RFID)-enabled applications. Without appropriate formal privacy models, it is difficult for...
Li Lu, Yunhao Liu, Xiang-Yang Li
HICSS
2003
IEEE
151views Biometrics» more  HICSS 2003»
14 years 29 days ago
A Simple GSPN for Modeling Common Mode Failures in Critical Infrastructures
It is now apparent that our nation’s infrastructures and essential utilities have been optimized for reliability in benign operating environments. As such, they are susceptible ...
Axel W. Krings, Paul W. Oman
DEBU
2008
186views more  DEBU 2008»
13 years 7 months ago
A Survey of Collaborative Recommendation and the Robustness of Model-Based Algorithms
The open nature of collaborative recommender systems allows attackers who inject biased profile data to have a significant impact on the recommendations produced. Standard memory-...
Jeff J. Sandvig, Bamshad Mobasher, Robin D. Burke
SMA
2010
ACM
204views Solid Modeling» more  SMA 2010»
13 years 7 months ago
Topologically correct reconstruction of tortuous contour forests
Electrophysiological modeling of dendrites and other neurological processes is generally done in a simplified manner, by treating these structures as a series of cylinders (aka ca...
John Edwards, Chandrajit L. Bajaj
SSDBM
2010
IEEE
105views Database» more  SSDBM 2010»
14 years 23 days ago
Organization of Data in Non-convex Spatial Domains
We present a technique for organizing data in spatial databases with non-convex domains based on an automatic characterization using the medial-axis transform (MAT). We define a t...
Eric A. Perlman, Randal C. Burns, Michael M. Kazhd...