Sciweavers

495 search results - page 13 / 99
» Modeling the Vulnerability Discovery Process
Sort
View
JCSS
2008
159views more  JCSS 2008»
13 years 7 months ago
Analysing distributed Internet worm attacks using continuous state-space approximation of process algebra models
Internet worms are classically described using SIR models and simulations, to capture the massive dynamics of the system. Here we are able to generate a differential equation-base...
Jeremy T. Bradley, Stephen T. Gilmore, Jane Hillst...
JMLR
2006
125views more  JMLR 2006»
13 years 7 months ago
A Linear Non-Gaussian Acyclic Model for Causal Discovery
In recent years, several methods have been proposed for the discovery of causal structure from non-experimental data. Such methods make various assumptions on the data generating ...
Shohei Shimizu, Patrik O. Hoyer, Aapo Hyvärin...
ICONIP
2007
13 years 9 months ago
Discovery of Linear Non-Gaussian Acyclic Models in the Presence of Latent Classes
Abstract. An effective way to examine causality is to conduct an experiment with random assignment. However, in many cases it is impossible or too expensive to perform controlled ...
Shohei Shimizu, Aapo Hyvärinen
ICASSP
2011
IEEE
12 years 11 months ago
Polyphase filters - A model for teaching the art of discovery in DSP
By its very nature DSP is a mathematically heavy topic and to fully understand it students need to understand the mathematical developments underlying DSP topics. However, relying...
Mark L. Fowler
ICASSP
2008
IEEE
14 years 2 months ago
Controlling the false discovery rate in modeling brain functional connectivity
Graphical models of brain functional connectivity have matured from con rming a priori hypotheses to an exploratory tool for discovering unknown connectivity. However, exploratory...
Junning Li, Z. Jane Wang, Martin J. McKeown