Sciweavers

1142 search results - page 189 / 229
» Some Applications of Interval Analysis to Statistical Proble...
Sort
View
IPCCC
2007
IEEE
14 years 1 months ago
Detecting Misused Keys in Wireless Sensor Networks
Key management is the cornerstone for secure communication in sensor networks. Researchers have recently developed many techniques to setup pairwise keys between sensor nodes. How...
Donggang Liu, Qi Dong
CCS
2003
ACM
14 years 27 days ago
Learning attack strategies from intrusion alerts
Understanding the strategies of attacks is crucial for security applications such as computer and network forensics, intrusion response, and prevention of future attacks. This pap...
Peng Ning, Dingbang Xu
ICSE
1997
IEEE-ACM
13 years 11 months ago
Introducing Formal Specification Methods in Industrial Practice
Formal specification methods are not often applied in industrial projects, despite their advantages and the maturity of theories and tools. The scarce familiarity of practitioners...
Luciano Baresi, Alessandro Orso, Mauro Pezzè...
CORR
2010
Springer
189views Education» more  CORR 2010»
13 years 6 months ago
Robust PCA via Outlier Pursuit
Singular Value Decomposition (and Principal Component Analysis) is one of the most widely used techniques for dimensionality reduction: successful and efficiently computable, it ...
Huan Xu, Constantine Caramanis, Sujay Sanghavi
INFOCOM
2010
IEEE
13 years 6 months ago
Buffer Management for Aggregated Streaming Data with Packet Dependencies
Abstract—In many applications the traffic traversing the network has inter-packet dependencies due to application-level encoding schemes. For some applications, e.g., multimedia...
Gabriel Scalosub, Peter Marbach, Jörg Liebehe...