Sciweavers

1097 search results - page 163 / 220
» Boosting with incomplete information
Sort
View
CHES
2005
Springer
108views Cryptology» more  CHES 2005»
15 years 3 months ago
Further Hidden Markov Model Cryptanalysis
We extend the model of Karlof and Wagner for modelling side channel attacks via Input Driven Hidden Markov Models (IDHMM) to the case where not every state corresponds to a single ...
P. J. Green, Richard Noad, Nigel P. Smart
ECSQARU
2005
Springer
15 years 3 months ago
Hydrologic Models for Emergency Decision Support Using Bayesian Networks
In the presence of a river flood, operators in charge of control must take decisions based on imperfect and incomplete sources of information (e.g., data provided by a limited numb...
Martín Molina, Raquel Fuentetaja, Luis Garr...
FSTTCS
2005
Springer
15 years 3 months ago
Causal Closure for MSC Languages
Abstract. Message sequence charts (MSCs) are commonly used to specify interactions between agents in communicating systems. Their visual nature makes them attractive for describing...
Bharat Adsul, Madhavan Mukund, K. Narayan Kumar, V...
KIVS
2005
Springer
15 years 3 months ago
An Integrated Simulator for Inter-Domain Scenarios
Abstract. The simulation of large-scale inter-domain networks is useful for various aspects of network planning and management. It is also a challenge due to its scalability proble...
Matthias Scheidegger, Florian Baumgartner, Torsten...
RULEML
2005
Springer
15 years 3 months ago
A Visual Environment for Developing Defeasible Rule Bases for the Semantic Web
Defeasible reasoning is a rule-based approach for efficient reasoning with incomplete and inconsistent information. Such reasoning is useful for many applications in the Semantic W...
Nick Bassiliades, Efstratios Kontopoulos, Grigoris...