Sciweavers

1737 search results - page 114 / 348
» Using Strategy Objectives for Network Security Analysis
Sort
View
IWANN
1995
Springer
15 years 3 months ago
Test Pattern Generation for Analog Circuits Using Neural Networks and Evolutive Algorithms
This paper presents a comparative analysis of neural networks, simulated annealing, and genetic algorithms in the determination of input patterns for testing analog circuits. The ...
José Luis Bernier, Juan J. Merelo Guerv&oac...
IJMI
2007
140views more  IJMI 2007»
14 years 11 months ago
Securing electronic health records without impeding the flow of information
Objective: We present an integrated set of technologies, known as the Hippocratic Database, that enable healthcare enterprises to comply with privacy and security laws without imp...
Rakesh Agrawal, Christopher M. Johnson
IEAAIE
1999
Springer
15 years 4 months ago
Knowledge Acquisition Based on Semantic Balance of Internal and External Knowledge
This paper presents a strategy to handle incomplete knowledge during acquisition process. The goal of this research is to develop formal tools that benefit the law of semantic bala...
Vagan Y. Terziyan, Seppo Puuronen
DSN
2008
IEEE
15 years 1 months ago
Using an assurance case to support independent assessment of the transition to a new GPS ground control system
We describe a specific application of assurance cases to the problem of ensuring that a transition from a legacy system to its replacement will not compromise mission assurance ob...
Elisabeth A. Nguyen, William S. Greenwell, Myron H...
CCS
2011
ACM
13 years 12 months ago
Trust-based anonymous communication: adversary models and routing algorithms
We introduce a novel model of routing security that incorporates the ordinarily overlooked variations in trust that users have for different parts of the network. We focus on ano...
Aaron Johnson, Paul F. Syverson, Roger Dingledine,...