Sciweavers

2610 search results - page 405 / 522
» Computational Probabilistic Non-interference
Sort
View
121
Voted
DSN
2007
IEEE
15 years 9 months ago
Multiprocessors May Reduce System Dependability under File-Based Race Condition Attacks
Attacks exploiting race conditions have been considered rare and “low risk”. However, the increasing popularity of multiprocessors has changed this situation: instead of waiti...
Jinpeng Wei, Calton Pu
99
Voted
DSN
2007
IEEE
15 years 9 months ago
On the Quality of Service of Crash-Recovery Failure Detectors
In this paper, we study and model a crash-recovery target and its failure detector’s probabilistic behavior. We extend Quality of Service (QoS) metrics to measure the recovery d...
Tiejun Ma, Jane Hillston, Stuart Anderson
124
Voted
ICCV
2007
IEEE
15 years 9 months ago
Deformable Template As Active Basis
This article proposes an active basis model and a shared pursuit algorithm for learning deformable templates from image patches of various object categories. In our generative mod...
Ying Nian Wu, Zhangzhang Si, Chuck Fleming, Song C...
ICPPW
2007
IEEE
15 years 9 months ago
Cooperative Localization with Pre-Knowledge Using Bayesian Network for Wireless Sensor Networks
Obtaining location information by localization schemes for sensor nodes makes applications of wireless sensor networks (WSNs) more meaningful. Most of localization schemes only us...
Shih-Hsiang Lo, Chun-Hsien Wu, Yeh-Ching Chung
121
Voted
CCS
2007
ACM
15 years 9 months ago
Denial of service or denial of security?
We consider the effect attackers who disrupt anonymous communications have on the security of traditional high- and low-latency anonymous communication systems, as well as on the...
Nikita Borisov, George Danezis, Prateek Mittal, Pa...