Sciweavers

4616 search results - page 194 / 924
» Extreme Components Analysis
Sort
View
154
Voted
IJISEC
2008
188views more  IJISEC 2008»
15 years 2 months ago
Complete analysis of configuration rules to guarantee reliable network security policies
Abstract The use of different network security components, such as firewalls and network intrusion detection systems (NIDSs), is the dominant method to monitor and guarantee the se...
Joaquín García-Alfaro, Nora Boulahia...
133
Voted
SIAMNUM
2011
252views more  SIAMNUM 2011»
14 years 10 months ago
Analysis and Computation of Compatible Least-Squares Methods for div-curl Equations
We develop and analyze least-squares finite element methods for two complementary div-curl elliptic boundary value problems. The first one prescribes the tangential component of ...
Pavel B. Bochev, Kara Peterson, Christopher M. Sie...
137
Voted
IFIP
2010
Springer
14 years 10 months ago
A Formal Analysis of Authentication in the TPM
The Trusted Platform Module (TPM) is a hardware chip designed to enable computers to achieve a greater level of security than is possible in software alone. To this end, the TPM pr...
Stéphanie Delaune, Steve Kremer, Mark Dermo...
145
Voted
WSCG
2004
166views more  WSCG 2004»
15 years 4 months ago
De-noising and Recovering Images Based on Kernel PCA Theory
Principal Component Analysis (PCA) is a basis transformation to diagonalize an estimate of the covariance matrix of input data and, the new coordinates in the Eigenvector basis ar...
Pengcheng Xi, Tao Xu
156
Voted
JMLR
2010
218views more  JMLR 2010»
14 years 10 months ago
Simple Exponential Family PCA
Bayesian principal component analysis (BPCA), a probabilistic reformulation of PCA with Bayesian model selection, is a systematic approach to determining the number of essential p...
Jun Li, Dacheng Tao