Abstract. We present a framework for modeling adversaries in security protocol analysis, ranging from a Dolev-Yao style adversary to more powerful adversaries who can reveal differ...
Software evolution is characterized by inevitable changes of software and increasing software complexities, which in turn may lead to huge costs unless rigorously taking into acco...
Hongyu Pei Breivold, Ivica Crnkovic, Peter J. Erik...
This paper consists of two parts. The first part is the development of a datadriven Kalman filter for a non-uniformly sampled multirate (NUSM) system, including identification of ...
In some real world situations, linear models are not sufficient to represent accurately complex relations between input variables and output variables of a studied system. Multila...
The word over, among others, is associated with a great variety of syntactic categories and meanings. Although over has received attention from scholars in different frameworks for...