Search results
Jump to navigation
Jump to search
- ...oral dissertation was on the subject of computer viruses.<ref>Fred Cohen, "Computer Viruses", PhD Thesis, University of Southern California, ASP Press, 1988.</ ...decidable problem|undecidable]].<ref>L. M. Adleman, "An Abstract Theory of Computer Viruses", Advances in Cryptology – --Crypto '88, LNCS 403, pp. 354-374, 198 ...8 KB (1,175 words) - 06:41, 15 February 2025
- ...eness properties]], and can express properties such as [[Non-interference (security)|non-interference]] and observational determinism.{{sfn|Clarkson|Schneider| This representation is expressive enough to encompass several computational models, including [[Transition system|labeled transition systems]]{{sfn|Clarkson|S ...8 KB (1,097 words) - 21:57, 25 January 2024
- ...ware development|feature models in semantic memory|Semantic memory#Feature models}} ...ture models are visually represented by means of feature diagrams. Feature models are widely used during the whole product line development process and are c ...12 KB (1,868 words) - 04:36, 31 July 2024
- ...itle=Proceedings of the 13th ACM conference on Computer and communications security |chapter=Searchable symmetric encryption |date=2006-10-30|chapter-url=https * <math>\mathsf{Setup}</math> takes as input a security parameter <math>k</math> and a document collection <math>\mathbf{D}</math> ...17 KB (2,541 words) - 04:06, 22 July 2024
- ...of its main uses is in reliability theory, where the Marshall–Olkin copula models the dependence between random variables subjected to external shocks. ...n under the Marshall-Olkin copula|journal=ACM Transactions on Modeling and Computer Simulation |volume= 26|issue=2|pages=No.14|year=2016|doi=10.1145/2775106|s ...3 KB (396 words) - 22:29, 20 January 2024
- ...last=Goth|first=G.|date=2003|title=Addressing the monoculture|journal=IEEE Security & Privacy|volume=1|issue=6|pages=8–10|doi=10.1109/msecp.2003.1253561|s2cid= ...h Tuesday#Exploit Wednesday|exploit Wednesday]] in which after [[Windows]] security patches are released there is an increase exploitation events on not update ...11 KB (1,703 words) - 03:15, 22 January 2025
- {{Short description|Computational method for constructing 3D models}} In [[computer vision]], the '''inverse depth parametrization''' is a [[parametrization (g ...4 KB (610 words) - 07:58, 8 April 2024
- ...error-detection]] is impossible; for example, when the [[Hacker (computer security)|attacker]] can completely overwrite the encoded message. Although such cod ...alleable_Codes.pdf|doi=10.1007/978-3-642-55220-5_7|series=Lecture Notes in Computer Science|year=2014|isbn=978-3-642-55219-9}}</ref> ...13 KB (2,077 words) - 02:36, 19 April 2024
- ...) is a network protocol designed for traffic safety applications. As other computer network protocols, it is also subject to several attacks that can have fata == Security Issues == ...14 KB (2,173 words) - 20:35, 20 February 2025
- ...=9579095 |pmid=35032022}}</ref> By leveraging these prediction errors, the models consistently refine expectations and decrease computational complexity. Ty ...widespread applications in [[Cognitive science|cognitive sciences]] and [[computer vision]]. These methods have also found successful application in [[natural ...16 KB (2,263 words) - 08:53, 11 December 2024
- ...oceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security |chapter=RAPPOR: Randomized Aggregatable Privacy-Preserving Ordinal Respons ...Open Source Project for Differential Privacy |url=https://medium.com/uber-security-privacy/differential-privacy-open-source-7892c82c42b6 |date=Jul 13, 2017}}< ...14 KB (1,804 words) - 10:48, 25 January 2025
- ...Control, Communications, and Intelligence (C3I) Technologies for Homeland Security and Homeland Defense III (Proceedings Volume), Editor(s): Edward M. Carapez ...ich drive concept-model learning, adaptation, and formation of new concept-models for better correspondence to the input, bottom-up signals. ...22 KB (3,501 words) - 20:36, 21 December 2024
- ...[[Nondestructive testing|non-destructive testing]] of products and [[port security]] scanning for stowaway pests.<ref name=":4" /> ...(D) values. These standard error values can be estimated using theoretical models or [[Resampling (statistics)|resampling]] methods ([[Bootstrapping (statist ...19 KB (2,798 words) - 17:38, 2 February 2025
- ...rs | journal= IJCSNS International Journal of Computer Science and Network Security|volume=18 | issue=5 | date=May 2018| pages=102–103}}{{free access}}</ref> a ...9-point Discrete Laplacians; Derivation and Tables| journal=Department of Computer Science Technical Reports| date=7 January 1992| last1=Lynch| first1=Robert} ...11 KB (1,517 words) - 22:56, 9 February 2025
- A [[Turing machine]] (TM), a mathematical abstraction of a real computer (program), is said to be [[Turing machine equivalents#Oblivious Turing mach ...e a similar definition for the notion of [[Semantic security|computational security]].<ref name="CP13">{{citation |last1=Chung |first1=Kai-Min |title=A simple ...38 KB (6,143 words) - 06:17, 16 August 2024
- .... It is also used to identify hidden groups of terrorists and criminals in security related applications.<ref name=hasan:snda11/> In statistics, generative random graph models such as [[stochastic block model]]s propose an approach to generate links b ...19 KB (2,683 words) - 19:07, 10 February 2025
- ...sion of a graph appears in various contexts of computing. For instance, in computer systems, different users of a system can be allowed or disallowed accessing A similar scenario is known in [[computer security]], more specifically in secure [[broadcast]]ing. In that setup, several mes ...14 KB (1,931 words) - 17:16, 28 November 2024
- ...nature scheme called [[EdDSA]] that offers high performance while avoiding security problems that have surfaced in other digital signature schemes. ...10 KB (1,557 words) - 07:15, 7 February 2025
- {{Short description|Concept in computer vision}} ...nd detection''' is one of the major tasks in the field of [[Machine vision|computer vision]] and [[image processing]] whose aim is to detect changes in image s ...28 KB (4,211 words) - 01:47, 24 January 2025
- {{Short description|Optimization problem in computer science}} ...nal hardness assumption|average-case hard]], providing a test case for the security of cryptographic algorithms. In addition, some lattice problems which are ...28 KB (4,074 words) - 21:46, 21 April 2024