Sciweavers

1521 search results - page 255 / 305
» Role analysis
Sort
View
CSFW
2002
IEEE
14 years 2 months ago
Capturing Parallel Attacks within the Data Independence Framework
We carry forward the work described in our previous papers [3, 14, 12] on the application of data independence to the model checking of cryptographic protocols using CSP [13] and ...
Philippa J. Broadfoot, A. W. Roscoe
INFOCOM
1998
IEEE
14 years 2 months ago
Active Reliable Multicast
Abstract--This paper presents a novel loss recovery scheme, Active Reliable Multicast (ARM), for large-scale reliable multicast. ARM is "active" in that routers in the mu...
Li-Wei H. Lehman, Stephen J. Garland, David L. Ten...
SP
1998
IEEE
173views Security Privacy» more  SP 1998»
14 years 2 months ago
An Automated Approach for Identifying Potential Vulnerabilities in Software
This paper presents results from analyzing the vulnerability of security-critical software applications to malicious threats and anomalous events using an automated fault injectio...
Anup K. Ghosh, Tom O'Connor, Gary McGraw
ICDAR
1997
IEEE
14 years 2 months ago
The Function of Documents
The purpose of a document is to facilitate the transfer of information from its author to its readers. It is the author’s job to design the document so that the information it c...
David S. Doermann, Azriel Rosenfeld, Ehud Rivlin
KDD
2010
ACM
242views Data Mining» more  KDD 2010»
13 years 12 months ago
A scalable two-stage approach for a class of dimensionality reduction techniques
Dimensionality reduction plays an important role in many data mining applications involving high-dimensional data. Many existing dimensionality reduction techniques can be formula...
Liang Sun, Betul Ceran, Jieping Ye