Sciweavers

1599 search results - page 232 / 320
» Probabilistic Analysis of Anonymity
Sort
View
IAT
2009
IEEE
13 years 12 months ago
Efficient Distributed Bayesian Reasoning via Targeted Instantiation of Variables
Abstract--This paper is focusing on exact Bayesian reasoning in systems of agents, which represent weakly coupled processing modules supporting collaborative inference through mess...
Patrick de Oude, Gregor Pavlin
ACSAC
2004
IEEE
13 years 12 months ago
Designing Good Deceptions in Defense of Information Systems
Since attackers trust computer systems to tell them the truth, it may be effective for those systems to lie or mislead. This could waste the attacker's resources while permit...
Neil C. Rowe
ECML
2006
Springer
13 years 11 months ago
Batch Classification with Applications in Computer Aided Diagnosis
Abstract. Most classification methods assume that the samples are drawn independently and identically from an unknown data generating distribution, yet this assumption is violated ...
Volkan Vural, Glenn Fung, Balaji Krishnapuram, Jen...
IMA
1995
Springer
97views Cryptology» more  IMA 1995»
13 years 11 months ago
A New Algorithm for Finding Minimum-Weight Words in Large Linear Codes
An algorithm for finding small-weight words in large linear codes is developed and a precise analysis of its complexity is given. It is in particular able to decode random [512,256...
Anne Canteaut
CAV
2010
Springer
173views Hardware» more  CAV 2010»
13 years 11 months ago
A Model Checker for AADL
We present a graphical toolset for verifying AADL models, which are gaining widespread acceptance in aerospace, automobile and avionics industries for comprehensively specifying sa...
Marco Bozzano, Alessandro Cimatti, Joost-Pieter Ka...