Sciweavers

2079 search results - page 183 / 416
» Quantifying Information Flow
Sort
View
GFKL
2006
Springer
108views Data Mining» more  GFKL 2006»
14 years 27 days ago
Identifying and Exploiting Ultrametricity
We begin with pervasive ultrametricity due to high dimensionality and/or spatial sparsity. How extent or degree of ultrametricity can be quantified leads us to the discussion of va...
Fionn Murtagh
ESORICS
2008
Springer
13 years 11 months ago
Formally Bounding the Side-Channel Leakage in Unknown-Message Attacks
Abstract. We propose a novel approach for quantifying a system's resistance to unknown-message side-channel attacks. The approach is based on a measure of the secret informati...
Michael Backes, Boris Köpf
IJCAI
1989
13 years 10 months ago
The Logic of Time Structures: Temporal and Nonmonotonic Features
We Imbed Into a first order logic a representation language that combines atemporal knowledge with time stamps in a hierarchical fashion. Each time structure contains its own chro...
Mira Balaban, Neil V. Murray
DCC
2010
IEEE
13 years 9 months ago
Anonymity in shared symmetric key primitives
We provide a stronger definition of anonymity in the context of shared symmetric key primitives, and show that existing schemes do not provide this level of anonymity. A new schem...
Gregory M. Zaverucha, Douglas R. Stinson
CDC
2009
IEEE
147views Control Systems» more  CDC 2009»
13 years 7 months ago
A Distributed Hybrid Filter for target tracking in sensor networks
In this paper, we propose the Distributed Hybrid Filter (DHF) to overcome the performance degradation in Sigma Point Filters caused by bad linearization. A quantifiable criterion t...
Feng Li, Jamie S. Evans