Sciweavers

1428 search results - page 62 / 286
» aim 2010
Sort
View
CSFW
2010
IEEE
14 years 12 days ago
Analysing Unlinkability and Anonymity Using the Applied Pi Calculus
—An attacker that can identify messages as coming from the same source, can use this information to build up a picture of targets’ behaviour, and so, threaten their privacy. In...
Myrto Arapinis, Tom Chothia, Eike Ritter, Mark Rya...
ICLP
2010
Springer
14 years 12 days ago
Circumscription and Projection as Primitives of Logic Programming
We pursue a representation of logic programs as classical first-order sentences. Different semantics for logic programs can then be expressed by the way in which they are wrapped...
Christoph Wernhard
WCNC
2010
IEEE
14 years 11 days ago
Throughput Analysis for Cooperation in Random Access Networks
—This paper aims at answering the questions of how to enable cooperative communications in random access networks. And, since cooperation introduces extra transmissions in the ch...
Amr El-Sherif, K. J. Ray Liu
AINA
2010
IEEE
14 years 10 days ago
Empirical Analysis of Attackers Activity on Multi-tier Web Systems
—Web-based systems commonly face unique set of vulnerabilities and security threats due to their high exposure, access by browsers, and integration with databases. In this paper ...
Katerina Goseva-Popstojanova, Brandon Miller, Rist...
ICPR
2010
IEEE
13 years 12 months ago
Probabilistic Clustering Using the Baum-Eagon Inequality
The paper introduces a framework for clustering data objects in a similarity-based context. The aim is to cluster objects into a given number of classes without imposing a hard pa...
Samuel Rota Bulo', Marcello Pelillo