Sciweavers

5263 search results - page 945 / 1053
» Open Constraint Optimization
Sort
View
152
Voted
SICHERHEIT
2010
15 years 1 months ago
A Fuzzy Model for IT Security Investments
: This paper presents a fuzzy set based decision support model for taking uncertainty into account when making security investment decisions for distributed systems. The proposed m...
Guido Schryen
132
Voted
CIMAGING
2009
130views Hardware» more  CIMAGING 2009»
15 years 1 months ago
Quantitative phase and amplitude imaging using Differential-Interference Contrast (DIC) microscopy
We present an extension of the development of an alternating minimization (AM) method1 for the computation of a specimen's complex transmittance function (magnitude and phase...
Chrysanthe Preza, Joseph A. O'Sullivan
141
Voted
CISC
2009
Springer
148views Cryptology» more  CISC 2009»
15 years 1 months ago
Using Strategy Objectives for Network Security Analysis
The anticipation game framework is an extension of attack graphs based on game theory. It is used to anticipate and analyze intruder and administrator concurrent interactions with ...
Elie Bursztein, John C. Mitchell
158
Voted
ICIP
2009
IEEE
15 years 1 months ago
Total variation projection with first order schemes
This article proposes a new algorithm to compute the projection on the set of images whose total variation is bounded by a constant. The projection is computed through a dual form...
Mohamed-Jalal Fadili, Gabriel Peyré
128
Voted
ICOODB
2009
94views Database» more  ICOODB 2009»
15 years 1 months ago
Metamodelling with Datalog and Classes: ConceptBase at the Age of 21
ConceptBase is a deductive object-oriented database system intended for the management of metadata. A distinguishing feature of the Telos language underlying ConceptBase is the abi...
Matthias Jarke, Manfred A. Jeusfeld, Hans W. Nisse...