Sciweavers

416 search results - page 45 / 84
» Enough of Processes - Lets do Practices
Sort
View
FC
2009
Springer
150views Cryptology» more  FC 2009»
15 years 4 months ago
Privacy-Preserving Information Markets for Computing Statistical Data
Abstract. Consider an “information market” where private and potentially sensitive data are collected, treated as commodity and processed into aggregated information with comme...
Aggelos Kiayias, Bülent Yener, Moti Yung
PTS
2007
120views Hardware» more  PTS 2007»
14 years 11 months ago
Towards Systematic Signature Testing
: The success and the acceptance of intrusion detection systems essentially depend on the accuracy of their analysis. Inaccurate signatures strongly trigger false alarms. In practi...
Sebastian Schmerl, Hartmut König
CSDA
2006
103views more  CSDA 2006»
14 years 9 months ago
LASS: a tool for the local analysis of self-similarity
The Hurst parameter H characterizes the degree of long-range dependence (and asymptotic selfsimilarity) in stationary time series. Many methods have been developed for the estimat...
Stilian Stoev, Murad S. Taqqu, Cheolwoo Park, Geor...
CVPR
2005
IEEE
15 years 11 months ago
A Cross-Validatory Statistical Approach to Scale Selection for Image Denoising by Nonlinear Diffusion
Scale-spaces induced by diffusion processes play an important role in many computer vision tasks. Automatically selecting the most appropriate scale for a particular problem is a ...
George Papandreou, Petros Maragos
FM
2009
Springer
106views Formal Methods» more  FM 2009»
15 years 4 months ago
Translating Safe Petri Nets to Statecharts in a Structure-Preserving Way
Statecharts and Petri nets are two popular visual formalisms for modelling complex systems that exhibit concurrency. Both formalisms are supported by various design tools. To enabl...
Rik Eshuis