Sciweavers

854 search results - page 66 / 171
» Abstracting from Failure Probabilities
Sort
View
ICICS
2004
Springer
15 years 9 months ago
Automatic Covert Channel Analysis of a Multilevel Secure Component
Abstract. The NRL Pump protocol defines a multilevel secure component whose goal is to minimize leaks of information from high level systems to lower level systems, without degrad...
Ruggero Lanotte, Andrea Maggiolo-Schettini, Simone...
EMMCVPR
1999
Springer
15 years 8 months ago
Adaptive Bayesian Contour Estimation: A Vector Space Representation Approach
Abstract. We propose a vector representation approach to contour estimation from noisy data. Images are modeled as random elds composed of a set of homogeneous regions contours (bo...
José M. B. Dias
AI
2006
Springer
15 years 8 months ago
Modeling Causal Reinforcement and Undermining with Noisy-AND Trees
Abstract. Causal modeling, such as noisy-OR, reduces probability parameters to be acquired in constructing a Bayesian network. Multiple causes can reinforce each other in producing...
Y. Xiang, N. Jia
SSPR
2000
Springer
15 years 8 months ago
A New Approximation Method of the Quadratic Discriminant Function
Abstract. For many statistical pattern recognition methods, distributions of sample vectors are assumed to be normal, and the quadratic discriminant function derived from the proba...
Shinichiro Omachi, Fang Sun, Hirotomo Aso
ACNS
2010
Springer
145views Cryptology» more  ACNS 2010»
15 years 7 months ago
A Hybrid Method to Detect Deflation Fraud in Cost-Per-Action Online Advertising
Abstract. Web advertisers prefer the cost-per-action (CPA) advertisement model whereby an advertiser pays a web publisher according to the actual amount of transactions, rather tha...
Xuhua Ding