Sciweavers

295 search results - page 30 / 59
» Approximating the Expressive Power of Logics in Finite Model...
Sort
View
SP
2010
IEEE
152views Security Privacy» more  SP 2010»
14 years 7 months ago
Scalable Parametric Verification of Secure Systems: How to Verify Reference Monitors without Worrying about Data Structure Size
The security of systems such as operating systems, hypervisors, and web browsers depend critically on reference monitors to correctly enforce their desired security policy in the ...
Jason Franklin, Sagar Chaki, Anupam Datta, Arvind ...
91
Voted
ICC
2007
IEEE
165views Communications» more  ICC 2007»
15 years 4 months ago
Capacity Analysis of MIMO System Over Identically Independent Distributed Weibull Fading Channels
— The capacity of multiple input multiple output (MIMO) system over wireless channels has been investigated analytically and by simulation over different types of wireless fading...
Ibrahim Y. Abualhaol, Mustafa M. Matalgah
AAAI
1996
14 years 11 months ago
Trajectory Constraints in Qualitative Simulation
We present a method for specifying temporal constraints on trajectories of dynamical systems and enforcing them during qualitative simulation. This capability can be used to focus...
Giorgio Brajnik, Daniel J. Clancy
CORR
2008
Springer
118views Education» more  CORR 2008»
14 years 9 months ago
The price of certainty: "waterslide curves" and the gap to capacity
The classical problem of reliable point-to-point digital communication is to achieve a low probability of error while keeping the rate high and the total power consumption small. ...
Anant Sahai, Pulkit Grover
LPKR
1997
Springer
15 years 1 months ago
Abduction, Argumentation and Bi-Disjunctive Logic Programs
Abstract. We study the relationship between argumentation (abduction) and disjunctive logic programming. Based on the paradigm of argumentation, an abductive semantic framework for...
Kewen Wang, Huowang Chen