Sciweavers

834 search results - page 122 / 167
» Quantifying and Measuring Anonymity
Sort
View
ECOOP
2006
Springer
14 years 1 months ago
Modeling Runtime Behavior in Framework-Based Applications
Abstract. Our research group has analyzed many industrial, frameworkbased applications. In these applications, simple functionality often requires excessive runtime activity. It is...
Nick Mitchell, Gary Sevitsky, Harini Srinivasan
ESORICS
2006
Springer
14 years 1 months ago
Towards an Information-Theoretic Framework for Analyzing Intrusion Detection Systems
IDS research still needs to strengthen mathematical foundations and theoretic guidelines. In this paper, we build a formal framework, based on information theory, for analyzing and...
Guofei Gu, Prahlad Fogla, David Dagon, Wenke Lee, ...
EWSN
2006
Springer
14 years 1 months ago
An Empirical Characterization of Radio Signal Strength Variability in 3-D IEEE 802.15.4 Networks Using Monopole Antennas
The wide availability of radio signal strength attenuation information on wireless radios has received considerable attention as a convenient means of deriving positioning informat...
Dimitrios Lymberopoulos, Quentin Lindsey, Andreas ...
ICSE
2000
IEEE-ACM
14 years 1 months ago
A case study of open source software development: the Apache server
According to its proponents, open source style software development has the capacity to compete successfully, and perhaps in many cases displace, traditional commercial developmen...
Audris Mockus, Roy T. Fielding, James D. Herbsleb
MICCAI
2000
Springer
14 years 1 months ago
Ultrasound/MRI Overlay with Image Warping for Neurosurgery
Performing a craniotomy will cause brain tissue to shift. As a result of the craniotomy, the accuracy of stereotactic localization techniques is reduced unless the brain shift can ...
David G. Gobbi, Roch M. Comeau, Terry M. Peters