Sciweavers

4255 search results - page 147 / 851
» Cover
Sort
View
IH
2010
Springer
15 years 2 months ago
The Reverse Statistical Disclosure Attack
Abstract. Statistical disclosure is a well-studied technique that an attacker can use to uncover relations between users in mix-based anonymity systems. Prior work has focused on f...
Nayantara Mallesh, Matthew K. Wright
IGARSS
2009
15 years 2 months ago
Developing a Neural-network-based "BRDF" Tool for the UAE Coastal and Inland Zones
The radiation reflected by any observed surface is highly dependent on both sun illumination and satellite observation angles. These two angles are also described, respectively, a...
Ali Al Suwaidi, Adnan Al Rais, Hosni Ghedira, Maro...
IGARSS
2009
15 years 2 months ago
Improving NDVI Time Series Class Separation using an Extended Kalman Filter
It is proposed that the NDVI time series derived from MODIS multitemporal remote sensing data can be modelled as a triply (mean, phase and amplitude) modulated cosine function. A ...
Waldo Kleynhans, J. Corne Olivier, Brian P. Salmon...
FUIN
2010
141views more  FUIN 2010»
15 years 1 months ago
Decidability Problems in Petri Nets with Names and Replication
In this paper we study decidability of several extensions of P/T nets with name creation and/or replication. In particular, we study how to restrict the models of RN systems (P/T n...
Fernando Rosa Velardo, David de Frutos-Escrig
VSTTE
2012
Springer
13 years 12 months ago
Infeasible Code Detection
A piece of code in a computer program is infeasible if it cannot be part of any normally-terminating execution of the program. We develop an algorithm for the automatic detection o...
Cristiano Bertolini, Martin Schäf, Pascal Sch...