Sciweavers

674 search results - page 111 / 135
» Using Abuse Case Models for Security Requirements Analysis
Sort
View
NIPS
2004
13 years 10 months ago
Optimal Information Decoding from Neuronal Populations with Specific Stimulus Selectivity
A typical neuron in visual cortex receives most inputs from other cortical neurons with a roughly similar stimulus preference. Does this arrangement of inputs allow efficient read...
Marcelo A. Montemurro, Stefano Panzeri
ICNP
2005
IEEE
14 years 2 months ago
Expected Convergence Properties of BGP
Border Gateway Protocol (BGP) is the de facto standard used for interdomain routing. Since packet forwarding may not be possible until stable routes are learned, it is not only cr...
Ramesh Viswanathan, Krishan K. Sabnani, Robert J. ...
ICCSA
2010
Springer
13 years 11 months ago
Transferring Indicators into Different Partitions of Geographic Space
Nowadays, spatial analysis led on complex phenomenon implies the usage of data available on heterogeneous territorial meshes, that is to say misaligned meshes. Then, combine these ...
Christine Plumejeaud, Julie Prud'homme, Paule-Anni...
SP
2006
IEEE
100views Security Privacy» more  SP 2006»
14 years 3 months ago
Fundamental Limits on the Anonymity Provided by the MIX Technique
The MIX technique forms the basis of many popular services that offer anonymity of communication in open and shared networks such as the Internet. In this paper, fundamental limit...
Dogan Kesdogan, Dakshi Agrawal, Dang Vinh Pham, Di...
CSDA
2007
120views more  CSDA 2007»
13 years 9 months ago
Boosting ridge regression
Ridge regression is a well established method to shrink regression parameters towards zero, thereby securing existence of estimates. The present paper investigates several approac...
Gerhard Tutz, Harald Binder