Sciweavers

363 search results - page 51 / 73
» Modeling Attack Behaviors in Rating Systems
Sort
View
GW
2005
Springer
141views Biometrics» more  GW 2005»
14 years 1 months ago
From Acoustic Cues to an Expressive Agent
This work proposes a new way for providing feedback to expressivity in music performance. Starting from studies on the expressivity of music performance we developed a system in wh...
Maurizio Mancini, Roberto Bresin, Catherine Pelach...
TCS
2008
13 years 7 months ago
Cryptographically-masked flows
Abstract. Cryptographic operations are essential for many security-critical systems. Reasoning about information flow in such systems is challenging because typical (noninterferenc...
Aslan Askarov, Daniel Hedin, Andrei Sabelfeld
BMCBI
2008
160views more  BMCBI 2008»
13 years 7 months ago
Dynamic sensitivity analysis of biological systems
Background: A mathematical model to understand, predict, control, or even design a real biological system is a central theme in systems biology. A dynamic biological system is alw...
Wu Hsiung Wu, Feng Sheng Wang, Maw Shang Chang
ACSAC
2004
IEEE
13 years 11 months ago
Reasoning About Complementary Intrusion Evidence
This paper presents techniques to integrate and reason about complementary intrusion evidence such as alerts generated by intrusion detection systems (IDSs) and reports by system ...
Yan Zhai, Peng Ning, Purush Iyer, Douglas S. Reeve...
ACSAC
2004
IEEE
13 years 11 months ago
RACOON: Rapidly Generating User Command Data For Anomaly Detection From Customizable Templates
One of the biggest obstacles faced by user command based anomaly detection techniques is the paucity of data. Gathering command data is a slow process often spanning months or yea...
Ramkumar Chinchani, Aarthie Muthukrishnan, Madhusu...