Sciweavers

9231 search results - page 1694 / 1847
» informs 2008
Sort
View
128
Voted
IJAR
2008
161views more  IJAR 2008»
15 years 3 months ago
Bayesian learning for a class of priors with prescribed marginals
We present Bayesian updating of an imprecise probability measure, represented by a class of precise multidimensional probability measures. Choice and analysis of our class are mot...
Hermann Held, Thomas Augustin, Elmar Kriegler
136
Voted
IJNSEC
2008
131views more  IJNSEC 2008»
15 years 3 months ago
Performance Analysis of Soft Computing Based Anomaly Detectors
Anomaly detectors have become a necessary component of the computer and information security framework. Some of the numerous drawbacks experienced by the current Anomaly detectors...
N. Srinivasan, V. Vaidehi
122
Voted
IJNSEC
2008
96views more  IJNSEC 2008»
15 years 3 months ago
Eliminating Quadratic Slowdown in Two-Prime RSA Function Sharing
The nature of the RSA public modulus N as a composite of at least two secret large primes was always considered as a major obstacle facing the RSA function sharing without the hel...
Maged Hamada Ibrahim
122
Voted
IJSN
2008
145views more  IJSN 2008»
15 years 3 months ago
Clique-based group key assignment in Wireless Sensor Networks
: Security has become the corner stone of research in wireless sensor networks (WSNs). Due to the unique operational environment of WSNs, where the communication medium is open to ...
Avinash Srinivasan, Feng Li, Jie Wu, Minglu Li
140
Voted
IS
2008
15 years 3 months ago
Conformance checking of processes based on monitoring real behavior
Many companies have adopted Process-aware Information Systems (PAIS) to support their business processes in some form. On the one hand these systems typically log events (e.g., in ...
Anne Rozinat, Wil M. P. van der Aalst
« Prev « First page 1694 / 1847 Last » Next »