Sciweavers

734 search results - page 33 / 147
» Computer Virus Propagation Models
Sort
View
WS
2006
ACM
15 years 3 months ago
Proactive security for mobile messaging networks
The interoperability of IM (Instant Messaging) and SMS (Short Messaging Service) networks allows users to seamlessly use a variety of computing devices from desktops to cellular p...
Abhijit Bose, Kang G. Shin
ISBI
2006
IEEE
15 years 10 months ago
3-D tomographic reconstruction of the average propagator from MRI data
The measurement of the 3-D "average propagator", P(r), from diffusion-weighted (DW) NMR or MRI data has been a "holy grail" in materials science and biomedicin...
Valery Pickalov, Peter J. Basser
CPAIOR
2008
Springer
14 years 11 months ago
Propagating Separable Equalities in an MDD Store
We present a propagator that achieves MDD consistency for a separable equality over an MDD (multivalued decision diagram) store in pseudo-polynomial time. We integrate the propagat...
Tarik Hadzic, John N. Hooker, Peter Tiedemann
ADHOCNOW
2004
Springer
15 years 3 months ago
Analysis of the Information Propagation Time Among Mobile Hosts
Consider k particles, 1 red and k −1 white, chasing each other on the nodes of a graph G. If the red one catches one of the white, it “infects” it with its color. The newly ...
Tassos Dimitriou, Sotiris E. Nikoletseas, Paul G. ...
ICCS
2007
Springer
15 years 1 months ago
Belief Flow in Assertion Networks
We define an abstract model of belief propagation on a graph based on the methodology of the revision theory of truth together with the Assertion Network Toolkit, a graphical inter...
Sujata Ghosh, Benedikt Löwe, Erik Scorelle