Sciweavers

784 search results - page 43 / 157
» An underlying model for defeat mechanisms
Sort
View
GAMESEC
2010
136views Game Theory» more  GAMESEC 2010»
14 years 7 months ago
Effective Multimodel Anomaly Detection Using Cooperative Negotiation
Abstract. Many computer protection tools incorporate learning techniques that build mathematical models to capture the characteristics of system's activity and then check whet...
Alberto Volpatto, Federico Maggi, Stefano Zanero
ICRA
2000
IEEE
108views Robotics» more  ICRA 2000»
15 years 2 months ago
Deformable Volumes in Path Planning Applications
This paper addresses the problem of path planning for a class of deformable volumes under fairly general manipulation constraints. The underlying geometric model for the volume is...
Elliot Anshelevich, Scott Owens, Florent Lamiraux,...
ICML
2008
IEEE
15 years 10 months ago
Multi-task compressive sensing with Dirichlet process priors
Compressive sensing (CS) is an emerging field that, under appropriate conditions, can significantly reduce the number of measurements required for a given signal. In many applicat...
Yuting Qi, Dehong Liu, David B. Dunson, Lawrence C...
WCC
2005
Springer
123views Cryptology» more  WCC 2005»
15 years 3 months ago
RSA-Based Secret Handshakes
A secret handshake mechanism allows two entities, members of a same group, to authenticate each other secretly. This primitive was introduced recently by Balfanz, Durfee, Shankar, ...
Damien Vergnaud
WDAG
2005
Springer
101views Algorithms» more  WDAG 2005»
15 years 3 months ago
Keeping Denial-of-Service Attackers in the Dark
Abstract. We consider the problem of overcoming (Distributed) Denial of Service (DoS) attacks by realistic adversaries that can eavesdrop on messages, or parts thereof, but with so...
Gal Badishi, Amir Herzberg, Idit Keidar