Sciweavers

4511 search results - page 545 / 903
» Observation Based System Security
Sort
View
MMSEC
2004
ACM
104views Multimedia» more  MMSEC 2004»
15 years 10 months ago
Key-assignment strategies for CPPM
CSS, the first system to protect multimedia content on the new DVD medium failed badly, because both its encryption algorithm and its key management could easily be broken. A new ...
André Adelsbach, Jörg Schwenk
BMCBI
2010
156views more  BMCBI 2010»
15 years 5 months ago
Comparative classification of species and the study of pathway evolution based on the alignment of metabolic pathways
Background: Pathways provide topical descriptions of cellular circuitry. Comparing analogous pathways reveals intricate insights into individual functional differences among speci...
Adi Mano, Tamir Tuller, Oded Béjà, R...
INFOCOM
2011
IEEE
14 years 8 months ago
An analytical approach to real-time misbehavior detection in IEEE 802.11 based wireless networks
—The distributed nature of the CSMA/CA based wireless protocols, e.g., the IEEE 802.11 distributed coordinated function (DCF), allows malicious nodes to deliberately manipulate t...
Jin Tang, Yu Cheng, Weihua Zhuang
JAIR
2010
165views more  JAIR 2010»
15 years 3 months ago
A Model-Based Active Testing Approach to Sequential Diagnosis
Model-based diagnostic reasoning often leads to a large number of diagnostic hypotheses. The set of diagnoses can be reduced by taking into account extra observations (passive mon...
Alexander Feldman, Gregory M. Provan, Arjan J. C. ...
ESANN
2007
15 years 6 months ago
Causality analysis of LFPs in micro-electrode arrays based on mutual information
Since perceptual and motor processes in the brain are the result of interactions between neurons, layers and areas, a lot of attention has been directed towards the development of...
Nikolay V. Manyakov, Marc M. Van Hulle