Sciweavers

505 search results - page 34 / 101
» Message from General Co-Chairs
Sort
View
UM
2007
Springer
14 years 4 months ago
Exploiting Evidence Analysis in Plan Recognition
Information graphics, such as bar charts and line graphs, that appear in popular media generally have a message that they are intended to convey. We have developed a novel plan inf...
Sandra Carberry, Stephanie Elzer
WPES
2006
ACM
14 years 4 months ago
Nonesuch: a mix network with sender unobservability
Oblivious submission to anonymity systems is a process by which a message may be submitted in such a way that neither the anonymity network nor a global passive adversary may dete...
Thomas S. Heydt-Benjamin, Andrei Serjantov, Beness...
INFOCOM
2011
IEEE
13 years 1 months ago
Optimal control of epidemic evolution
—Epidemic models based on nonlinear differential equations have been extensively applied in a variety of systems as diverse as infectious outbreaks, marketing, diffusion of belie...
M. H. R. Khouzani, Saswati Sarkar, Eitan Altman
CCS
2004
ACM
14 years 3 months ago
Fragile mixing
No matter how well designed and engineered, a mix server offers little protection if its administrator can be convinced to log and selectively disclose correspondences between it...
Michael K. Reiter, XiaoFeng Wang
ASPLOS
2010
ACM
14 years 4 months ago
SherLog: error diagnosis by connecting clues from run-time logs
Computer systems often fail due to many factors such as software bugs or administrator errors. Diagnosing such production run failures is an important but challenging task since i...
Ding Yuan, Haohui Mai, Weiwei Xiong, Lin Tan, Yuan...