Sciweavers

355 search results - page 8 / 71
» Risk Analysis of Robust System Design
Sort
View
74
Voted
ICIP
2005
IEEE
15 years 11 months ago
Resistance analysis of scalable video fingerprinting systems under fair collusion attacks
Digital fingerprinting is an important tool in multimedia forensics to trace traitors and protect multimedia content after decryption. This paper addresses the enforcement of digi...
H. Vicky Zhao, K. J. Ray Liu
VOTEID
2007
Springer
15 years 3 months ago
Assessing Procedural Risks and Threats in e-Voting: Challenges and an Approach
Performing a good security analysis on the design of a system is an essential step in order to guarantee a reasonable level of protection. However, different attacks and threats m...
Komminist Weldemariam, Adolfo Villafiorita, Andrea...
ISER
1995
Springer
100views Robotics» more  ISER 1995»
15 years 1 months ago
Parameter Sensitivity Analysis for Design and Control of Tendon Transmissions
We apply sensitivity analysis to the design and control of a tendon transmission. With this approach, some prefered values for the system parameters and a feedback compensator can...
Vincent Hayward, Juan Manuel Cruz-Hernández
95
Voted
WSC
2001
14 years 11 months ago
Graphical methods for robust design of a semiconductor burn-in process
Discrete-event simulation is a common tool for the analysis of semiconductor manufacturing systems. With the aid of a simulation model, and in conjunction with sensitivity analysi...
Scott L. Rosen, Chad A. Geist, Daniel A. Finke, Jy...
CSFW
2010
IEEE
15 years 1 months ago
Towards Quantitative Analysis of Proofs of Authorization: Applications, Framework, and Techniques
—Although policy compliance testing is generally treated as a binary decision problem, the evidence gathered during the trust management process can actually be used to examine t...
Adam J. Lee, Ting Yu