Sciweavers

499 search results - page 40 / 100
» A Study on Latent Vulnerabilities
Sort
View
EUROSYS
2006
ACM
15 years 9 months ago
Reducing TCB complexity for security-sensitive applications: three case studies
The large size and high complexity of securitysensitive applications and systems software is a primary cause for their poor testability and high vulnerability. One approach to all...
Lenin Singaravelu, Calton Pu, Hermann Härtig,...
125
Voted
TMA
2010
Springer
314views Management» more  TMA 2010»
15 years 7 months ago
On the Use of TCP Passive Measurements for Anomaly Detection: A Case Study from an Operational 3G Network
In this work we discuss the use of passive measurements of TCP performance indicators in support of network operation and troubleshooting, presenting a case-study from a real 3G ce...
Peter Romirer-Maierhofer, Angelo Coluccia, Tobias ...
GRC
2005
IEEE
15 years 6 months ago
Visualization of protein-protein interaction network for knowledge discovery
A new visualization tool, called "Visual Concept Explorer (VCE)", was developed to visualize concept relationships in bio-medical literatura VCE integrates Pathfinder Net...
Weizhong Zhu, Xia Lin, Xiaohua Hu, Bahrad A. Sokha...
AI
2007
Springer
15 years 18 days ago
Anyone but him: The complexity of precluding an alternative
Preference aggregation in a multiagent setting is a central issue in both human and computer contexts. In this paper, we study in terms of complexity the vulnerability of preferen...
Edith Hemaspaandra, Lane A. Hemaspaandra, Jör...
CVPR
2006
IEEE
16 years 2 months ago
Modeling and Classifying Breast Tissue Density in Mammograms
We present a new approach to model and classify breast parenchymal tissue. Given a mammogram, first, we will discover the distribution of the different tissue densities in an unsu...
Anna Bosch, Arnau Oliver, Joan Martí, Xavie...