Sciweavers

762 search results - page 32 / 153
» Modeling and Simulating Information Security Management
Sort
View
PET
2009
Springer
14 years 2 months ago
Using Linkability Information to Attack Mix-Based Anonymity Services
There exist well established models for anonymity focusing on traffic analysis, i. e., analysing properties of single messages as, e. g., timing. However there is only little work ...
Stefan Schiffner, Sebastian Clauß
DELTA
2002
IEEE
14 years 19 days ago
Multi-Level Fault Simulation of Digital Systems on Decision Diagrams
A new method for hierarchical fault simulation based on multi-level Decision Diagrams (DD) is proposed. We suppose that a register transfer (RT) level information along with gate-...
Raimund Ubar, Jaan Raik, Eero Ivask, Marina Brik
FBIT
2007
IEEE
14 years 2 months ago
An Efficient Soft Tissue Characterization Method for Haptic Rendering of Soft Tissue Deformation in Medical Simulation
The modeling of soft tissue behavior is essential in haptic rendering for virtual reality based medical simulators, which provide a safe and objective medium for training medical ...
Bummo Ahn, Jung Kim
KDD
2004
ACM
159views Data Mining» more  KDD 2004»
14 years 1 months ago
Optimal randomization for privacy preserving data mining
Randomization is an economical and efficient approach for privacy preserving data mining (PPDM). In order to guarantee the performance of data mining and the protection of individ...
Michael Yu Zhu, Lei Liu
CORR
2010
Springer
432views Education» more  CORR 2010»
13 years 7 months ago
A Distributed Trust Management Framework for Detecting Malicious Packet Dropping Nodes in a Mobile Ad Hoc Network
In a multi-hop mobile ad hoc network (MANET) mobile nodes communicate with each other forming a cooperative radio network. Security remains a major challenge for these networks du...
Jaydip Sen