Sciweavers

674 search results - page 69 / 135
» Using Abuse Case Models for Security Requirements Analysis
Sort
View
IJCNN
2007
IEEE
14 years 4 months ago
Predictive E-Mail Server Performability Analysis Based on Fuzzy Arithmetic
–The performability of disk arrays systems has been studied before. However, in the case of imprecise data, a fuzzy model can be the base for the performability analysis. This pa...
Guillermo Navarro, Milos Manic
ICA
2004
Springer
14 years 3 months ago
Postnonlinear Overcomplete Blind Source Separation Using Sparse Sources
Abstract. We present an approach for blindly decomposing an observed random vector x into f(As) where f is a diagonal function i.e. f = f1 × . . . × fm with one-dimensional funct...
Fabian J. Theis, Shun-ichi Amari
ENTCS
2008
87views more  ENTCS 2008»
13 years 10 months ago
A Lightweight Approach for the Semantic Validation of Model Refinements
Model Driven Engineering proposes the use of models at different levels of ion. Step by step validation of model refinements is necessary to guarantee the correctness of the final ...
Claudia Pons, Diego García
CCS
2008
ACM
14 years 8 days ago
Revocation games in ephemeral networks
A frequently proposed solution to node misbehavior in mobile ad hoc networks is to use reputation systems. But in ephemeral networks - a new breed of mobile networks where contact...
Maxim Raya, Mohammad Hossein Manshaei, Márk...
SIGMOD
2012
ACM
220views Database» more  SIGMOD 2012»
12 years 22 days ago
GUPT: privacy preserving data analysis made easy
It is often highly valuable for organizations to have their data analyzed by external agents. However, any program that computes on potentially sensitive data risks leaking inform...
Prashanth Mohan, Abhradeep Thakurta, Elaine Shi, D...