Sciweavers

345 search results - page 10 / 69
» When Systems Loose their Identity
Sort
View
SP
2009
IEEE
123views Security Privacy» more  SP 2009»
14 years 2 months ago
DSybil: Optimal Sybil-Resistance for Recommendation Systems
Recommendation systems can be attacked in various ways, and the ultimate attack form is reached with a sybil attack, where the attacker creates a potentially unlimited number of s...
Haifeng Yu, Chenwei Shi, Michael Kaminsky, Phillip...
IJBC
2007
77views more  IJBC 2007»
13 years 7 months ago
Stability Computations for Nilpotent Hopf bifurcations in Coupled Cell Systems
Vanderbauwhede and van Gils, Krupa, and Langford studied unfoldings of bifurcations with purely imaginary eigenvalues and a nonsemisimple linearization, which generically occurs i...
M. Golubitsky, M. Krupa
ECCV
2006
Springer
14 years 9 months ago
Tracking and Labelling of Interacting Multiple Targets
Abstract. Successful multi-target tracking requires solving two problems - localize the targets and label their identity. An isolated target's identity can be unambiguously pr...
Josephine Sullivan, Stefan Carlsson
DSN
2007
IEEE
14 years 1 months ago
On the Cost of Modularity in Atomic Broadcast
Modularity is a desirable property of complex software systems, since it simplifies code reuse, verification, maintenance, etc. However, the use of loosely coupled modules intro...
Olivier Rütti, Sergio Mena, Richard Ekwall, A...
CORR
2010
Springer
140views Education» more  CORR 2010»
13 years 4 months ago
Construction of New Delay-Tolerant Space-Time Codes
Perfect Space-Time Codes are optimal codes in their original construction for Multiple Input Multiple Output (MIMO) systems. Based on cyclic division algebras, they are full-rate,...
Mireille Sarkiss, Ghaya Rekaya-Ben Othman, Mohamed...