Sciweavers

798 search results - page 123 / 160
» presence 2006
Sort
View
ESORICS
2006
Springer
15 years 1 months ago
Modeling and Evaluating the Survivability of an Intrusion Tolerant Database System
The immaturity of current intrusion detection techniques limits the traditional security systems in surviving malicious attacks. Intrusion tolerance approaches have emerged to over...
Hai Wang, Peng Liu
EUROCRYPT
2006
Springer
15 years 1 months ago
Private Circuits II: Keeping Secrets in Tamperable Circuits
Abstract. Motivated by the problem of protecting cryptographic hardware, we continue the investigation of private circuits initiated in [16]. In this work, our aim is to construct ...
Yuval Ishai, Manoj Prabhakaran, Amit Sahai, David ...
EUROSSC
2006
Springer
15 years 1 months ago
Multi-channel Support for Dense Wireless Sensor Networking
Currently, most wireless sensor network applications assume the presence of single-channel Medium Access Control (MAC) protocols. When sensor nodes are densely deployed, single-cha...
Özlem Durmaz Incel, Stefan Dulman, Pierre G. ...
FSTTCS
2006
Springer
15 years 1 months ago
Normal and Feature Approximations from Noisy Point Clouds
We consider the problem of approximating normal and feature sizes of a surface from point cloud data that may be noisy. These problems are central to many applications dealing wit...
Tamal K. Dey, Jian Sun
CIARP
2006
Springer
14 years 11 months ago
Robustness Analysis of the Neural Gas Learning Algorithm
The Neural Gas (NG) is a Vector Quantization technique where a set of prototypes self organize to represent the topology structure of the data. The learning algorithm of the Neural...
Carolina Saavedra, Sebastián Moreno, Rodrig...