Sciweavers

156 search results - page 18 / 32
» Insider Threat Analysis Using Information-Centric Modeling
Sort
View
CEC
2007
IEEE
13 years 11 months ago
Emergence of feedback in artificial gene regulatory networks
In this paper, we present a model for simulating the evolution of development together with a method for the analysis of emergence of negative feedback inside the regulatory networ...
Till Steiner, Lisa Schramm, Yaochu Jin, Bernhard S...
NDSS
2005
IEEE
14 years 1 months ago
Security Analysis and Improvements for IEEE 802.11i
This paper analyzes the IEEE 802.11i wireless networking standard with respect to data confidentiality, integrity, mutual authentication, and availability. Under our threat model,...
Changhua He, John C. Mitchell
ICIP
1994
IEEE
14 years 9 months ago
Tomographic Reconstruction Based on Flexible Geometric Models
When dealing with ill-posed inverse problems in data analysis, the Bayesian approach allows one to use prior information to guide the result toward reasonable solutions. In this w...
K. M. Hanson, G. S. Cunningham, G. R. Jennings Jr....
VLDB
2004
ACM
102views Database» more  VLDB 2004»
14 years 26 days ago
PIVOT and UNPIVOT: Optimization and Execution Strategies in an RDBMS
PIVOT and UNPIVOT, two operators on tabular data that exchange rows and columns, enable data transformations useful in data modeling, data analysis, and data presentation. They ca...
Conor Cunningham, Goetz Graefe, César A. Ga...
CDC
2008
IEEE
107views Control Systems» more  CDC 2008»
14 years 2 months ago
Resource pooling for optimal evacuation of a large building
— This paper is concerned with modeling, analysis and optimization/control of occupancy evolution in a large building. The main concern is efficient evacuation of a building in ...
Kun Deng, Wei Chen, Prashant G. Mehta, Sean P. Mey...