نتایج جستجو برای: cards model
تعداد نتایج: 2113502 فیلتر نتایج به سال:
The UConn VoTeR Center performed an audit of the pre-election memory cards for the AccuVote Optical Scan tabulators that were to be used in the November 2007 Connecticut Elections. The cards were programmed by LHS Associates of Methuen, Massachusetts, and shipped to the towns in Connecticut. The towns were instructed to test the cards and to choose randomly one out of each four cards per distri...
The approach used in this paper is an implementation of a data mining process against real-life transactions of debit cards with the aim of detecting suspicious behavior. The framework designed for this purpose has been obtained through merging supervised and unsupervised models. First, due to unlabeled data, Twostep and Self-Organizing Map algorithms have been used in clustering the transactio...
Abstract This paper shows new card-based cryptographic protocols using private operations that are secure against malicious players. Physical cards used in instead of computers. Operations a player executes place where the other players cannot see called operations. Using several operations, calculations two variable Boolean functions and copy were realized with minimum number cards. Though ver...
In this paper it is shown that no public announcement scheme that can be modeled in Dynamic Epistemic Logic (DEL) can solve the Russian Cards Problem (RCP) in one announcement. Since DEL is a general model for any public announcement scheme [11], [3], [6], [21], [12] we conclude that there exist no single announcement solution to the RCP. The proof demonstrates the utility of DEL in proving low...
This paper investigates the market structure of the payment card market with consumers and merchants basing their subscription decisions on various information sets. We find that the market structure depends crucially on this information set, where we observe that a market with few cards dominating only emerges when decisions are based on very limited information. For more complete information ...
Wide distributed applications involve several partners, this requires security features when the software components are deployed between the partners. Moreover, the end-user is more and more nomadic and uses several terminals to browse his services. We believe smart cards can be used to meet these new requirements. However, smart cards acts mainly as isolated servers. We propose to improve the...
This paper studies estimation of a panel data model with latent structures where individuals can be classified into different groups where slope parameters are homogeneous within the same group but heterogeneous across groups. To identify the unknown group structure of vector parameters, we design an algorithm called Panel-CARDS which is a systematic extension of the CARDS procedure proposed by...
The Legic Prime system uses proprietary RFIDs to secure building access and micropayment applications. The employed algorithms rely on obscurity and consequently did not withstand scrutiny. This paper details how the algorithms were found from opening silicon chips as well as interacting with tags and readers. The security of the tags is based on several secret check-sums but no secret keys are...
A major research problem in intrusion detection is the efficient Detection of coordinated attacks over large networks. Issues to be resolved include determining what data should be collected, which portion of the data should be analyzed, where the analysis of the data should take place, and how to correlate multi-source information. This paper proposes the architecture of a Coordinated Attack R...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید