Sciweavers

5131 search results - page 266 / 1027
» Heterogeneous Component Analysis
Sort
View
IJISEC
2008
188views more  IJISEC 2008»
15 years 3 months ago
Complete analysis of configuration rules to guarantee reliable network security policies
Abstract The use of different network security components, such as firewalls and network intrusion detection systems (NIDSs), is the dominant method to monitor and guarantee the se...
Joaquín García-Alfaro, Nora Boulahia...
SIAMNUM
2011
252views more  SIAMNUM 2011»
14 years 11 months ago
Analysis and Computation of Compatible Least-Squares Methods for div-curl Equations
We develop and analyze least-squares finite element methods for two complementary div-curl elliptic boundary value problems. The first one prescribes the tangential component of ...
Pavel B. Bochev, Kara Peterson, Christopher M. Sie...
145
Voted
IFIP
2010
Springer
14 years 11 months ago
A Formal Analysis of Authentication in the TPM
The Trusted Platform Module (TPM) is a hardware chip designed to enable computers to achieve a greater level of security than is possible in software alone. To this end, the TPM pr...
Stéphanie Delaune, Steve Kremer, Mark Dermo...
WSCG
2004
166views more  WSCG 2004»
15 years 6 months ago
De-noising and Recovering Images Based on Kernel PCA Theory
Principal Component Analysis (PCA) is a basis transformation to diagonalize an estimate of the covariance matrix of input data and, the new coordinates in the Eigenvector basis ar...
Pengcheng Xi, Tao Xu
JMLR
2010
218views more  JMLR 2010»
14 years 11 months ago
Simple Exponential Family PCA
Bayesian principal component analysis (BPCA), a probabilistic reformulation of PCA with Bayesian model selection, is a systematic approach to determining the number of essential p...
Jun Li, Dacheng Tao