Sciweavers

1286 search results - page 181 / 258
» A Practical Modelling Notation for Secure Distributed Comput...
Sort
View
122
Voted
CCS
2006
ACM
15 years 4 months ago
Design space and analysis of worm defense strategies
We give the first systematic investigation of the design space of worm defense system strategies. We accomplish this by g a taxonomy of defense strategies by abstracting away impl...
David Brumley, Li-Hao Liu, Pongsin Poosankam, Dawn...
CCS
2008
ACM
15 years 2 months ago
Reducing protocol analysis with XOR to the XOR-free case in the horn theory based approach
In the Horn theory based approach for cryptographic protocol analysis, cryptographic protocols and (Dolev-Yao) intruders are modeled by Horn theories and security analysis boils d...
Ralf Küsters, Tomasz Truderung
CVPR
2008
IEEE
16 years 2 months ago
Volumetric reconstruction from multi-energy single-view radiography
We address the volumetric reconstruction problem that takes as input a series of orthographic multi-energy x-ray images, producing as output a reconstructed model space consisting...
Sang N. Le, Mei Kay Lee, Shamima Banu, Anthony C. ...
DCC
2010
IEEE
15 years 7 months ago
A Flexible Multiple Description Coding Scheme Based on Rateless Codes
The multiple description coding of an independent and identically distributed Gaussian source over bit error channels is considered. A novel practical multiple description coding ...
Ozgun Y. Bursalioglu, Giuseppe Caire
STOC
1997
ACM
111views Algorithms» more  STOC 1997»
15 years 4 months ago
The Swendsen-Wang Process Does Not Always Mix Rapidly
The Swendsen-Wang process provides one possible dynamics for the Qstate Potts model in statistical physics. Computer simulations of this process are widely used to estimate the ex...
Vivek Gore, Mark Jerrum