The problem of defending software against tampering by a malicious host is not expected to be solved soon. Rather than trying to defend against the first attack, randomization tri...
Bertrand Anckaert, Mariusz H. Jakubowski, Ramarath...
Abstract. We consider in this paper the problem of discovering, via a traceroute algorithm, the topology of a network, whose graph is spanned by an infinite branching process. A s...
Abstract. In this paper we approach feature set selection phase in signature verification by applying the method for selection of regression variables based on Mallows Cp criterio...
A mass problem is a set of Turing oracles. If P and Q are mass problems, we say that P is weakly reducible to Q if every member of Q Turing computes a member of P. We say that P i...
Dynamic image analysis requires the estimation of time-varying model parameters (e.g., shape coe cients). This can be11 seen as states of a dynamic model which are restricted to a...