Sciweavers

2740 search results - page 439 / 548
» A Model-Based Approach To Requirements Analysis
Sort
View
134
Voted
FOSSACS
2009
Springer
15 years 10 months ago
Bisimulation for Demonic Schedulers
Bisimulation between processes has been proven a successful method for formalizing security properties. We argue that in certain cases, a scheduler that has full information on the...
Konstantinos Chatzikokolakis, Gethin Norman, David...
ICFCA
2009
Springer
15 years 10 months ago
Yet a Faster Algorithm for Building the Hasse Diagram of a Concept Lattice
Formal concept analysis (FCA) is increasingly applied to data mining problems, essentially as a formal framework for mining reduced representations (bases) of target pattern famili...
Jaume Baixeries, Laszlo Szathmary, Petko Valtchev,...
GLOBECOM
2009
IEEE
15 years 10 months ago
Channel Orthogonalizing Precoder for Open-Loop QO-STBC Systems
—This paper proposes a new preprocessing scheme for rate-one quasi-orthogonal space-time block code (QO-STBC), which requires no channel state information at the transmitter. We ...
Heejin Kim, Heunchul Lee, Inkyu Lee
ICC
2009
IEEE
132views Communications» more  ICC 2009»
15 years 10 months ago
A Chaotic Maps-Based Key Agreement Protocol that Preserves User Anonymity
—A key agreement protocol is a protocol whereby two or more communicating parties can agree on a key or exchange information over an open communication network in such a way that...
Huei-Ru Tseng, Rong-Hong Jan, Wuu Yang
ICC
2009
IEEE
138views Communications» more  ICC 2009»
15 years 10 months ago
Measuring Indoor Mobile Wireless Link Quality
—This paper investigates methods for link quality measurement of an indoor, time-varying wireless link. Link quality estimates are used for a number of higher-layer functions, in...
Andreas Wapf, Michael R. Souryal