Sciweavers

3758 search results - page 624 / 752
» A Complete Subsumption Algorithm
Sort
View
IWSEC
2010
Springer
14 years 8 months ago
Optimal Adversary Behavior for the Serial Model of Financial Attack Trees
Abstract. Attack tree analysis is used to estimate different parameters of general security threats based on information available for atomic subthreats. We focus on estimating the...
Margus Niitsoo
JCM
2010
126views more  JCM 2010»
14 years 8 months ago
Adding Redundancy to Replication in Window-aware Delay-tolerant Routing
— This paper presents a resource-efficient protocol for opportunistic routing in delay-tolerant networks (DTN). First, our approach exploits the context of mobile nodes (speed, ...
Gabriel Sandulescu, Simin Nadjm-Tehrani
MICCAI
2010
Springer
14 years 8 months ago
Intra-Patient Supine-Prone Colon Registration in CT Colonography Using Shape Spectrum
CT colonography (CTC) is a minimally invasive screening technique for colorectal polyps and colon cancer. Since electronic colon cleansing (ECC) cannot completely remove the presen...
Zhaoqiang Lai, Jiaxi Hu, Chang Liu, Vahid Taimouri...
PVLDB
2010
110views more  PVLDB 2010»
14 years 8 months ago
Behavior Based Record Linkage
In this paper, we present a new record linkage approach that uses entity behavior to decide if potentially different entities are in fact the same. An entity’s behavior is extra...
Mohamed Yakout, Ahmed K. Elmagarmid, Hazem Elmelee...
SOCO
2010
Springer
14 years 8 months ago
Evolving the memory of a criminal's face: methods to search a face space more effectively
Witnesses and victims of serious crime are often required to construct a facial composite, a visual likeness of a suspect’s face. The traditional method is for them to select in...
Charlie D. Frowd, Vicki Bruce, Melanie Pitchford, ...