Sciweavers

1997 search results - page 339 / 400
» A Model for Data Leakage Detection
Sort
View
DAC
2008
ACM
16 years 25 days ago
Partial order reduction for scalable testing of systemC TLM designs
A SystemC simulation kernel consists of a deterministic implementation of the scheduler, whose specification is nondeterministic. To leverage testing of a SystemC TLM design, we f...
Sudipta Kundu, Malay K. Ganai, Rajesh Gupta
IPMI
2001
Springer
16 years 21 days ago
3D Vascular Segmentation Using MRA Statistics and Velocity Field Information in PC-MRA
Abstract. This paper presents a new and integrated approach to automatic 3D brain vessel segmentation using physics-based statistical models of background and vascular signals, and...
Albert C. S. Chung, J. Alison Noble, Paul E. Summe...
SIGMOD
2009
ACM
171views Database» more  SIGMOD 2009»
16 years 2 days ago
Secure outsourced aggregation via one-way chains
We consider the Outsourced Aggregation model, where sensing services outsource their sensor data collection and aggregation tasks to third-party service providers called aggregato...
Suman Nath, Haifeng Yu, Haowen Chan
CIDM
2009
IEEE
15 years 6 months ago
A new hybrid method for Bayesian network learning With dependency constraints
Abstract— A Bayes net has qualitative and quantitative aspects: The qualitative aspect is its graphical structure that corresponds to correlations among the variables in the Baye...
Oliver Schulte, Gustavo Frigo, Russell Greiner, We...
ICASSP
2009
IEEE
15 years 6 months ago
Risk-distortion analysis for video collusion attack
Collusion attack is a cost-effective attack against digital fingerprint. To develop an efficient collusion-resistant fingerprint scheme, it is very important for the detector t...
Yan Chen, W. Sabrina Lin, K. J. Ray Liu