Sciweavers

18 search results - page 3 / 4
» Differential Privacy versus Quantitative Information Flow
Sort
View
SP
2010
IEEE
210views Security Privacy» more  SP 2010»
13 years 9 months ago
Reconciling Belief and Vulnerability in Information Flow
Abstract—Belief and vulnerability have been proposed recently to quantify information flow in security systems. Both concepts stand as alternatives to the traditional approaches...
Sardaouna Hamadou, Vladimiro Sassone, Catuscia Pal...
BMCBI
2008
166views more  BMCBI 2008»
13 years 6 months ago
Learning transcriptional regulatory networks from high throughput gene expression data using continuous three-way mutual informa
Background: Probability based statistical learning methods such as mutual information and Bayesian networks have emerged as a major category of tools for reverse engineering mecha...
Weijun Luo, Kurt D. Hankenson, Peter J. Woolf
INFOCOM
2010
IEEE
13 years 4 months ago
On the Age of Pseudonyms in Mobile Ad Hoc Networks
—In many envisioned mobile ad hoc networks, nodes are expected to periodically beacon to advertise their presence. In this way, they can receive messages addressed to them or par...
Julien Freudiger, Mohammad Hossein Manshaei, Jean-...
BMCBI
2006
205views more  BMCBI 2006»
13 years 6 months ago
Application of Petri net based analysis techniques to signal transduction pathways
Background: Signal transduction pathways are usually modelled using classical quantitative methods, which are based on ordinary differential equations (ODEs). However, some diffic...
Andrea Sackmann, Monika Heiner, Ina Koch

Publication
1500views
15 years 7 months ago
Robust Centerline Extraction Framework Using Level Sets
In this paper, we present a novel framework for computing centerlines for both 2D and 3D shape analysis. The framework works as follows: an object centerline point is selected aut...
M. Sabry Hassouna, Aly A. Farag