نتایج جستجو برای: fail able against probabilistic disruptions

تعداد نتایج: 964647  

2004
Alessandra Di Pierro Chris Hankin Herbert Wiklicky

It is well known that observability is closely related to vulnerability against confidentiality attacks: once a low level process is able to observe differences in the behaviour of a high level process it is able to deduce information about its secrets, and confidentiality is thus at least partially violated. However, if whatever the high level secrets are, the behaviours of the observed proces...

2009
George Danezis Claudia Díaz Emilia Käsper Carmela Troncoso

We present a traffic analysis of the ADU anonymity scheme presented at ESORICS 2008, and the related RADU scheme. We show that optimal attacks are able to de-anonymize messages more effectively than believed before. Our analysis applies to single messages as well as long term observations using multiple messages. The search of a “better” scheme is bound to fail, since we prove that the original...

1999
Vasiliki Hartonas-Garmhausen Sérgio Vale Aguiar Campos Edmund M. Clarke

Model checking can tell us whether a system is correct; probabilistic model checking can also tell us whether a system is timely and reliable. Moreover, probabilistic model checking allows one to verify properties that may not be true with probability one, but may still hold with an acceptable probability. The challenge in developing a probabilistic model checker able to handle realistic system...

Journal: :The Journal of Experimental Medicine 2005
LiLi Tu Terry C. Fang David Artis Olga Shestova Seth E. Pross Ivan Maillard Warren S. Pear

Notch ligands and receptors have been implicated in helper T cell (Th cell) differentiation. Whether Notch signals are involved in differentiation of T helper type 1 (Th1) cells, Th2 cells, or both, however, remains unresolved. To clarify the role of Notch in Th cell differentiation, we generated mice that conditionally inactivate Notch signaling in mature T cells. Mice that lack Notch signalin...

2011
Atefeh Mashatan Khaled Ouafi

In this paper, we revisit the construction of fail-stop signatures from the factoring assumption. These signatures were originally proposed to provide information-theoretic-based security against forgeries. In contrast to classical signature schemes, in which signers are protected through a computational conjecture, fail-stop signature schemes protect the signers in an information theoretic sen...

2013
Reza Akbarinia Florent Masseglia

Discovering Probabilistic Frequent Itemsets (PFI) is very challenging since algorithms designed for deterministic data are not applicable in probabilistic data. The problem is even more difficult for probabilistic data streams where massive frequent updates need to be taken into account while respecting data stream constraints. In this paper, we propose FEMP (Fast and Exact Mining of Probabilis...

2011
Zuoyi Zhang Huiping Xu Ryan Martin Chuanhai Liu

Linear regression is arguably one of the most widely used statistical methods. However, important problems, especially variable selection, remain a challenge for classical modes of inference. This paper develops a recently proposed framework of inferential models (IMs) in the linear regression context. In general, the IM framework is able to produce meaningful probabilistic summaries of the sta...

1984
Fred B. Schneider Bharat Bhargava

2013
Naotaka Hatao Satoshi Kagami

This paper describes a method for classifying and tracking multiple moving objects with a laser range finder (LRF). As moving objects are tracked in the framework of sample-based joint probabilistic data association filters (SJPDAFs), the proposed method is robust against occlusions or false segmentation of LRF scans. It divides tracking targets and corresponding LRF segments into clusters and ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید