Sciweavers

8655 search results - page 1304 / 1731
» Challenges for Trusted Computing
Sort
View
BTW
2007
Springer
105views Database» more  BTW 2007»
15 years 10 months ago
When the Internet Hits the Road
: The Internet has recovered from the dot-com crash of the early 2000’s and now features an abundance of new, innovative technologies and services. We are also witnessing the eme...
Christian S. Jensen
CCS
2007
ACM
15 years 10 months ago
Detecting covert timing channels: an entropy-based approach
The detection of covert timing channels is of increasing interest in light of recent practice on the exploitation of covert timing channels over the Internet. However, due to the ...
Steven Gianvecchio, Haining Wang
CCS
2007
ACM
15 years 10 months ago
Topological analysis of network attack vulnerability
: To understand overall vulnerability to network attack, one must consider attacker exploits not just in isolation, but also in combination. That is, one must analyze how low-level...
Sushil Jajodia
COCOA
2007
Springer
15 years 10 months ago
Scaling, Renormalization, and Universality in Combinatorial Games: The Geometry of Chomp
: We develop a new approach to combinatorial games (e.g., chess, Go, checkers, Chomp, Nim) that unveils connections between such games and nonlinear phenomena commonly seen in natu...
Eric J. Friedman, Adam Scott Landsberg
DAGM
2007
Springer
15 years 10 months ago
Learning Robust Objective Functions with Application to Face Model Fitting
Abstract. Model-based image interpretation extracts high-level information from images using a priori knowledge about the object of interest. The computational challenge is to dete...
Matthias Wimmer, Sylvia Pietzsch, Freek Stulp, Ber...
« Prev « First page 1304 / 1731 Last » Next »