Sciweavers

734 search results - page 62 / 147
» Computer Virus Propagation Models
Sort
View
ICDCS
2010
IEEE
15 years 1 months ago
Analyzing Self-Defense Investments in Internet Security under Cyber-Insurance Coverage
—Internet users such as individuals and organizations are subject to different types of epidemic risks such as worms, viruses, and botnets. To reduce the probability of risk, an ...
Ranjan Pal, Leana Golubchik
CVPR
2008
IEEE
15 years 12 months ago
Principled fusion of high-level model and low-level cues for motion segmentation
High-level generative models provide elegant descriptions of videos and are commonly used as the inference framework in many unsupervised motion segmentation schemes. However, app...
Arasanathan Thayananthan, Masahiro Iwasaki, Robert...
DSN
2004
IEEE
15 years 1 months ago
Verifying Web Applications Using Bounded Model Checking
The authors describe the use of bounded model checking (BMC) for verifying Web application code. Vulnerable sections of code are patched automatically with runtime guards, allowin...
Yao-Wen Huang, Fang Yu, Christian Hang, Chung-Hung...
CORR
2012
Springer
170views Education» more  CORR 2012»
13 years 5 months ago
What Cannot be Learned with Bethe Approximations
We address the problem of learning the parameters in graphical models when inference is intractable. A common strategy in this case is to replace the partition function with its B...
Uri Heinemann, Amir Globerson
65
Voted
CGI
2004
IEEE
15 years 1 months ago
Visualizing Sunsets through Inhomogeneous Atmospheres
In this paper, it is described a method of curved ray tracing capable of depicting phenomena that arise, under certain conditions, when light propagates through an inhomogeneous a...
Francisco J. Serón, Diego Gutierrez, Guille...