Sciweavers

CORR
2006
Springer
82views Education» more  CORR 2006»
13 years 4 months ago
Explicit Randomness is not Necessary when Modeling Probabilistic Encryption
Although good encryption functions are probabilistic, most symbolic models do not capture this aspect explicitly. A typical solution, recently used to prove the soundness of such ...
Véronique Cortier, Heinrich Hördegen, ...
CORR
2006
Springer
126views Education» more  CORR 2006»
13 years 4 months ago
Belief Calculus
This paper describes a method for risk analysis based on the approach used in CRAMM, but instead of using discrete measures for threats and vulnerabilities and lookup tables to de...
Audun Jøsang
CORR
2006
Springer
112views Education» more  CORR 2006»
13 years 4 months ago
Imagination as Holographic Processor for Text Animation
Vadim Astakhov, Tamara Astakhova, Brian Sanders
CORR
2006
Springer
112views Education» more  CORR 2006»
13 years 4 months ago
Performance Analysis of Iterative Channel Estimation and Multiuser Detection in Multipath DS-CDMA Channels
Abstract--This paper examines the performance of decisionfeedback-based iterative channel estimation and multiuser detection in channel coded aperiodic direct sequence code divisio...
Husheng Li, Sharon M. Betz, H. Vincent Poor
CORR
2006
Springer
136views Education» more  CORR 2006»
13 years 4 months ago
On the Capacity of Multiple Access Channels with State Information and Feedback
In this correspondence, the multiple access channel (MAC) with channel state is analyzed in a scenario where a) the channel state is known non-causally to the transmitters and b) t...
Wei Wu, Sriram Vishwanath, Ari Arapostathis
CORR
2006
Springer
101views Education» more  CORR 2006»
13 years 4 months ago
Foundations of Modern Language Resource Archives
A number of serious reasons will convince an increasing amount of researchers to store their relevant material in centers which we will call "language resource archives"...
Peter Wittenburg, Daan Broeder, Wolfgang Klein, St...
CORR
2006
Springer
81views Education» more  CORR 2006»
13 years 4 months ago
Modeling Aspect Mechanisms: A Top-Down Approach
A plethora of aspect mechanisms exist today. All of these diverse mechanisms integrate concerns into artifacts that exhibit crosscutting structure. What we lack and need is a char...
Sergei Kojarski, David H. Lorenz
CORR
2006
Springer
86views Education» more  CORR 2006»
13 years 4 months ago
Mining Behavioral Groups in Large Wireless LANs
Wei-jen Hsu, Debojyoti Dutta, Ahmed Helmy
CORR
2006
Springer
96views Education» more  CORR 2006»
13 years 4 months ago
How accurate are the time delay estimates in gravitational lensing?
We present a novel approach to estimate the time delay between light curves of multiple images in a gravitationally lensed system, based on Kernel methods in the context of machine...
Juan C. Cuevas-Tello, Peter Tino, Somak Raychaudhu...