Sciweavers

981 search results - page 51 / 197
» Semantics-aware trace analysis
Sort
View
IH
2005
Springer
15 years 7 months ago
Compulsion Resistant Anonymous Communications
We study the effect compulsion attacks, through which an adversary can request a decryption or key from an honest node, have on the security of mix based anonymous communication s...
George Danezis, Jolyon Clulow
ECAI
2004
Springer
15 years 7 months ago
Explaining the Result of a Decision Tree to the End-User
This paper addresses the problem of the explanation of the result given by a decision tree, when it is used to predict the class of new cases. In order to evaluate this result, the...
Isabelle Alvarez
FUZZY
1999
Springer
164views Fuzzy Logic» more  FUZZY 1999»
15 years 6 months ago
A Fuzzy System for Fetal Heart Rate Assessment
The clinical interpretation of fetal heart rate traces is a difficult task that has led to the development computerised assessment systems. These systems are limited by their inabi...
Jonathan F. Skinner, Jonathan M. Garibaldi, Emmanu...
DATE
2003
IEEE
112views Hardware» more  DATE 2003»
15 years 7 months ago
Automatic Generation of Simulation Monitors from Quantitative Constraint Formula
System design methodology is poised to become the next big enabler for highly sophisticated electronic products. Design verification continues to be a major challenge and simulat...
Xi Chen, Harry Hsieh, Felice Balarin, Yosinori Wat...
TOMACS
2002
110views more  TOMACS 2002»
15 years 1 months ago
Rapid model parameterization from traffic measurements
The utility of simulations and analysis heavily relies on good models of network traffic. While network traffic constantly changing over time, existing approaches typically take y...
Kun-Chan Lan, John S. Heidemann