Sciweavers

1852 search results - page 94 / 371
» Block-level link analysis
Sort
View
117
Voted
ACSC
2006
IEEE
15 years 6 months ago
Trust network analysis with subjective logic
Trust networks consist of transitive trust relationships between people, organisations and software agents connected through a medium for communication and interaction. By formali...
Audun Jøsang, Ross Hayward, Simon Pope
136
Voted
ACSAC
2005
IEEE
15 years 6 months ago
Code Security Analysis of a Biometric Authentication System Using Automated Theorem Provers
Understanding the security goals provided by cryptographic protocol implementations is known to be difficult, since security requirements such as secrecy, integrity and authentici...
Jan Jürjens
94
Voted
ANSS
2005
IEEE
15 years 6 months ago
Approximation Techniques for the Analysis of Large Traffic-Groomed Tandem Optical Networks
We consider a traffic-groomed optical network consisting of N nodes arranged in tandem. This optical network is modeled by a tandem queueing network of multi-rate loss queues with...
Alicia Nicki Washington, Chih-Chieh Hsu, Harry G. ...
90
Voted
IH
2005
Springer
15 years 6 months ago
Fundamentals of Data Hiding Security and Their Application to Spread-Spectrum Analysis
This paper puts in consideration the concepts of security and robustness in watermarking, in order to be able to establish a clear frontier between them. A new information-theoreti...
Pedro Comesaña, Luis Pérez-Freire, F...
EVOW
2004
Springer
15 years 6 months ago
Evolutionary Search of Thresholds for Robust Feature Set Selection: Application to the Analysis of Microarray Data
Abstract. We deal with two important problems in pattern recognition that arise in the analysis of large datasets. While most feature subset selection methods use statistical techn...
Carlos Cotta, Christian Sloper, Pablo Moscato