Sciweavers

1599 search results - page 237 / 320
» Probabilistic Analysis of Anonymity
Sort
View
IJISEC
2008
119views more  IJISEC 2008»
13 years 8 months ago
Estimating the maximum information leakage
Preventing improper information leaks is a greatest challenge of the modern society. In this paper we present a technique for measuring the ability of several families of adversari...
Alessandro Aldini, Alessandra Di Pierro
JNW
2006
55views more  JNW 2006»
13 years 8 months ago
On Stochastic Modeling for Integrated Security and Dependability Evaluation
This paper presents a new approach to integrated security and dependability evaluation, which is based on stochastic modeling techniques. Our proposal aims to provide operational m...
Karin Sallhammar, Bjarne E. Helvik, Svein J. Knaps...
SIGPRO
2008
74views more  SIGPRO 2008»
13 years 8 months ago
Speaker segmentation and clustering
This survey focuses on two challenging speech processing topics, namely: speaker segmentation and speaker clustering. Speaker segmentation aims at finding speaker change points in...
Margarita Kotti, Vassiliki Moschou, Constantine Ko...
IJSN
2007
82views more  IJSN 2007»
13 years 8 months ago
Vulnerabilities in distance-indexed IP traceback schemes
: In order to counter Denial-of-Service (DoS) attacks using spoofed source addresses, many IP traceback schemes have been proposed in the last few years. Among them, distanceindexe...
Jianping Pan, Lin Cai, Xuemin Shen
ML
1998
ACM
153views Machine Learning» more  ML 1998»
13 years 7 months ago
Bayesian Landmark Learning for Mobile Robot Localization
To operate successfully in indoor environments, mobile robots must be able to localize themselves. Most current localization algorithms lack flexibility, autonomy, and often optim...
Sebastian Thrun