Sciweavers

1775 search results - page 238 / 355
» Antichains on Three Levels
Sort
View
ACSAC
2004
IEEE
15 years 5 months ago
High-Fidelity Modeling of Computer Network Worms
modeling, such as using epidemic models, has been the general method of choice for understanding and analyzing the high-level effects of worms. However, high-fidelity models, such...
Kalyan S. Perumalla, Srikanth Sundaragopalan
ANNPR
2006
Springer
15 years 5 months ago
Hierarchical Neural Networks Utilising Dempster-Shafer Evidence Theory
Abstract. Hierarchical neural networks show many benefits when employed for classification problems even when only simple methods analogous to decision trees are used to retrieve t...
Rebecca Fay, Friedhelm Schwenker, Christian Thiel,...
CHES
2004
Springer
106views Cryptology» more  CHES 2004»
15 years 5 months ago
XTR Implementation on Reconfigurable Hardware
Abstract. Recently, Lenstra and Verheul proposed an efficient cryptosystem called XTR. This system represents elements of F p6 with order dividing p2 -p+1 by their trace over Fp2 ....
Eric Peeters, Michael Neve, Mathieu Ciet
ATAL
2006
Springer
15 years 5 months ago
Security in multiagent systems by policy randomization
Security in multiagent systems is commonly defined as the ability of the system to deal with intentional threats from other agents. This paper focuses on domains where such intent...
Praveen Paruchuri, Milind Tambe, Fernando Ord&oacu...
DATE
2004
IEEE
97views Hardware» more  DATE 2004»
15 years 5 months ago
A Formal Verification Methodology for Checking Data Integrity
Formal verification techniques have been playing an important role in pre-silicon validation processes. One of the most important points considered in performing formal verificati...
Yasushi Umezawa, Takeshi Shimizu