Sciweavers

3918 search results - page 564 / 784
» Probabilistic model of triangulation
Sort
View
148
Voted
CAAP
1992
15 years 7 months ago
Varieties of Increasing Trees
We extend results about heights of random trees (Devroye, 1986, 1987, 1998b). In this paper, a general split tree model is considered in which the normalized subtree sizes of node...
François Bergeron, Philippe Flajolet, Bruno...
142
Voted
CCS
2009
ACM
15 years 7 months ago
The bayesian traffic analysis of mix networks
This work casts the traffic analysis of anonymity systems, and in particular mix networks, in the context of Bayesian inference. A generative probabilistic model of mix network ar...
Carmela Troncoso, George Danezis
126
Voted
ACSAC
2004
IEEE
15 years 7 months ago
Designing Good Deceptions in Defense of Information Systems
Since attackers trust computer systems to tell them the truth, it may be effective for those systems to lie or mislead. This could waste the attacker's resources while permit...
Neil C. Rowe
157
Voted
APWEB
2006
Springer
15 years 7 months ago
Energy-Efficient Deployment of Mobile Sensor Networks by PSO
Abstract. Sensor deployment is an important issue in designing sensor networks. In this paper, particle swarm optimization (PSO) approach is applied to maximize the coverage based ...
Xiaoling Wu, Shu Lei, Jin Wang, Jinsung Cho, Sungy...
147
Voted
CAV
2006
Springer
133views Hardware» more  CAV 2006»
15 years 7 months ago
Antichains: A New Algorithm for Checking Universality of Finite Automata
We propose and evaluate a new algorithm for checking the universality of nondeterministic finite automata. In contrast to the standard algorithm, which uses the subset construction...
Martin De Wulf, Laurent Doyen, Thomas A. Henzinger...