Sciweavers

813 search results - page 82 / 163
» Pipeline-centric provenance model
Sort
View
WORM
2003
13 years 10 months ago
Worm propagation modeling and analysis under dynamic quarantine defense
Due to the fast spreading nature and great damage of Internet worms, it is necessary to implement automatic mitigation, such as dynamic quarantine, on computer networks. Enlighten...
Cliff Changchun Zou, Weibo Gong, Donald F. Towsley
IJCAT
2010
87views more  IJCAT 2010»
13 years 7 months ago
Image-based measurement of alveoli volume expansion in an animal model of a diseased lung
Currently, there does not exist reliable MV treatment or protocols in critical care to treat acute respiratory diseases, and thus no proven way to optimise care to minimise the mor...
Christopher E. Hann, Darren Hewett, J. Geoffrey Ch...
ICCV
2007
IEEE
14 years 3 months ago
Total Recall: Automatic Query Expansion with a Generative Feature Model for Object Retrieval
Given a query image of an object, our objective is to retrieve all instances of that object in a large (1M+) image database. We adopt the bag-of-visual-words architecture which ha...
Ondrej Chum, James Philbin, Josef Sivic, Michael I...
JOC
2007
84views more  JOC 2007»
13 years 9 months ago
Concurrent Composition of Secure Protocols in the Timing Model
In the setting of secure multiparty computation, a set of mutually distrustful parties wish to securely compute some joint function of their inputs. In the stand-alone case, it ha...
Yael Tauman Kalai, Yehuda Lindell, Manoj Prabhakar...
CN
1999
100views more  CN 1999»
13 years 8 months ago
Testing protocols modeled as FSMs with timing parameters
An optimization method is introduced for generating minimum-length test sequences taking into account timing constraints for FSM models of communication protocols. Due to active t...
M. Ümit Uyar, Mariusz A. Fecko, Adarshpal S. ...