Sciweavers

5246 search results - page 102 / 1050
» Sanitization models and their limitations
Sort
View
USS
2010
14 years 9 months ago
Idle Port Scanning and Non-interference Analysis of Network Protocol Stacks Using Model Checking
Idle port scanning uses side-channel attacks to bounce scans off of a "zombie" host to stealthily scan a victim IP address and determine if a port is open or closed, or ...
Roya Ensafi, Jong Chun Park, Deepak Kapur, Jedidia...
IOR
2010
128views more  IOR 2010»
14 years 8 months ago
Dynamic Assortment Optimization with a Multinomial Logit Choice Model and Capacity Constraint
The paper considers a stylized model of a dynamic assortment optimization problem, where given a limited capacity constraint, we must decide the assortment of products to offer to...
Paat Rusmevichientong, Zuo-Jun Max Shen, David B. ...
CVPR
2012
IEEE
13 years 1 months ago
Modulation transfer function of patch-based stereo systems
A widely used technique to recover a 3D surface from photographs is patch-based (multi-view) stereo reconstruction. Current methods are able to reproduce fine surface details, th...
Ronny Klowsky, Arjan Kuijper, Michael Goesele
ICSM
2009
IEEE
15 years 6 months ago
Regression model checking
Model checking is a promising technique for verifying program behavior and is increasingly finding usage in industry. To date, however, researchers have primarily considered mode...
Guowei Yang, Matthew B. Dwyer, Gregg Rothermel
IFIP
2009
Springer
15 years 6 months ago
HMM-Based Trust Model
Probabilistic trust has been adopted as an approach to taking security sensitive decisions in modern global computing environments. Existing probabilistic trust frameworks either a...
Ehab ElSalamouny, Vladimiro Sassone, Mogens Nielse...