Sciweavers

2539 search results - page 178 / 508
» Debugging Method Names
Sort
View
CORR
2010
Springer
79views Education» more  CORR 2010»
15 years 2 months ago
Providing Data Group Anonymity Using Concentration Differences
Public access to digital data can turn out to be a cause of undesirable information disclosure. That's why it is vital to somehow protect the data before publishing. There are...
Oleg Chertov, Dan Tavrov
111
Voted
CSDA
2008
111views more  CSDA 2008»
15 years 2 months ago
Automatic bandwidth selection for circular density estimation
Given angular data 1, . . . , n [0, 2) a common objective is to estimate the density. In the case that a kernel estimator is used, bandwidth selection is crucial to the performan...
Charles C. Taylor
ENTCS
2008
110views more  ENTCS 2008»
15 years 2 months ago
Chosen-name Attacks: An Overlooked Class of Type-flaw Attacks
In the context of Dolev-Yao style analysis of security protocols, we consider the capability of an intruder to dynamically choose and assign names to agents. This capability has b...
Pieter Ceelen, Sjouke Mauw, Sasa Radomirovic
DEDS
2006
101views more  DEDS 2006»
15 years 2 months ago
Near-Optimal Online Control of Dynamic Discrete-Event Systems
A class of time-varying discrete-event systems, named dynamic discrete-event systems, is defined. The goal of this paper is to provide a method which is modular and can be applied ...
Lenko Grigorov, Karen Rudie
ENGL
2006
70views more  ENGL 2006»
15 years 2 months ago
Strategies for Service Discovery over Ad Hoc Networks
Service discovery is an important and necessary component of ad hoc networks. To fit within the context of such networks, a post-query model with several service discovery strateg...
Michel Barbeau, Evangelos Kranakis, Honghui Luo