Sciweavers

2997 search results - page 142 / 600
» Fuzzy robustness analysis
Sort
View
PLDI
2009
ACM
15 years 11 months ago
A weakest precondition approach to active attacks analysis
Information flow controls can be used to protect both data confidentiality and data integrity. The certification of the security degree of a program that runs in untrusted envi...
Musard Balliu, Isabella Mastroeni
CCS
2009
ACM
15 years 11 months ago
Robust signatures for kernel data structures
Kernel-mode rootkits hide objects such as processes and threads using a technique known as Direct Kernel Object Manipulation (DKOM). Many forensic analysis tools attempt to detect...
Brendan Dolan-Gavitt, Abhinav Srivastava, Patrick ...
BMCBI
2007
128views more  BMCBI 2007»
15 years 4 months ago
A robust and efficient algorithm for the shape description of protein structures and its application in predicting ligand bindin
Background: An accurate description of protein shape derived from protein structure is necessary to establish an understanding of protein-ligand interactions, which in turn will l...
Lei Xie, Philip E. Bourne
CIVR
2005
Springer
183views Image Analysis» more  CIVR 2005»
15 years 10 months ago
Automated Image Annotation Using Global Features and Robust Nonparametric Density Estimation
This paper describes a simple framework for automatically annotating images using non-parametric models of distributions of image features. We show that under this framework quite ...
Alexei Yavlinsky, Edward Schofield, Stefan M. R&uu...
ACRI
2004
Springer
15 years 10 months ago
Perturbing the Topology of the Game of Life Increases Its Robustness to Asynchrony
An experimental analysis of the asynchronous version of the “Game of Life” is performed to estimate how topology perturbations modify its evolution. We focus on the study of a ...
Nazim Fatès, Michel Morvan