Sciweavers

1737 search results - page 85 / 348
» Using Strategy Objectives for Network Security Analysis
Sort
View
RAS
2000
161views more  RAS 2000»
14 years 11 months ago
Active object recognition by view integration and reinforcement learning
A mobile agent with the task to classify its sensor pattern has to cope with ambiguous information. Active recognition of three-dimensional objects involves the observer in a sear...
Lucas Paletta, Axel Pinz
UML
2005
Springer
15 years 5 months ago
Performance Analysis of UML Models Using Aspect-Oriented Modeling Techniques
Abstract. Aspect-Oriented Modeling (AOM) techniques allow software designers to isolate and address separately solutions for crosscutting concerns (such as security, reliability, n...
Hui Shen, Dorina C. Petriu
CHI
1999
ACM
15 years 4 months ago
Learning and Performing by Exploration: Label Quality Measured by Latent Semantic Analysis
Models of learning and performing by exploration assume that the semantic distance between task descriptions and screen labels controls in part the usersÕ search strategies. Neve...
Rodolfo Soto
VTS
2007
IEEE
105views Hardware» more  VTS 2007»
15 years 6 months ago
Effects of Embedded Decompression and Compaction Architectures on Side-Channel Attack Resistance
Attack resistance has been a critical concern for security-related applications. Various side-channel attacks can be launched to retrieve security information such as encryption k...
Chunsheng Liu, Yu Huang
IEEEARES
2007
IEEE
15 years 6 months ago
STEF: A Secure Ticket-Based En-route Filtering Scheme for Wireless Sensor Networks
— Node compromise is a serious threat in wireless sensor networks. An adversary can use compromised nodes to inject false data into the network forging events to deceive the base...
Christoph Krauß, Markus Schneider, Kpatcha M...