We introduce tools to model and describe phishing attacks, allowing a visualization and quantification of the threat on a given complex system of web services. We use our new mod...
The automatic location of services that fulfill a given need is seen as a key step towards dynamic and scalable integration. In this paper we present a model for the automatic loc...
We discuss the main features of a multilevel dictionary based on a metamodel approach. The application is an implementation of ModelGen, the model management operator that translat...
Paolo Atzeni, Paolo Cappellari, Philip A. Bernstei...
Abstract. We propose a model of the shape, motion and appearance of a sequence of images that captures occlusions, scene deformations, arbitrary viewpoint variations and changes in...
Jeremy D. Jackson, Anthony J. Yezzi, Stefano Soatt...
This paper examines the problem of finding an optimal policy for a Partially Observable Markov Decision Process (POMDP) when the model is not known or is only poorly specified. W...
Abstract Self-assembly is a ubiquitous process in which small objects selforganize into larger and complex structures. In 2000, Rothemund and Winfree proposed a Tile Assembly Model...
Abstract. This paper presents the integration of 3D shape knowledge into a variational model for level set based image segmentation and tracking. Having a 3D surface model of an ob...
We present the first blind identity-based signcryption (BIBSC). We formulate its security model and define the security notions of blindness and parallel one-more unforgeability ...
In this paper, we describe an exploratory study to develop a model of visual attention that could aid automatic interpretation of exophors in situated dialog. The model is intended...
Donna K. Byron, Thomas Mampilly, Vinay Sharma, Tia...