Sciweavers

1411 search results - page 176 / 283
» Case Studies of an Insider Framework
Sort
View
ESORICS
2010
Springer
15 years 6 days ago
Modeling and Analyzing Security in the Presence of Compromising Adversaries
Abstract. We present a framework for modeling adversaries in security protocol analysis, ranging from a Dolev-Yao style adversary to more powerful adversaries who can reveal differ...
David A. Basin, Cas J. F. Cremers
COMPSAC
2008
IEEE
14 years 11 months ago
Analyzing Software Evolvability
Software evolution is characterized by inevitable changes of software and increasing software complexities, which in turn may lead to huge costs unless rigorously taking into acco...
Hongyu Pei Breivold, Ivica Crnkovic, Peter J. Erik...
AUTOMATICA
2008
107views more  AUTOMATICA 2008»
14 years 11 months ago
Kalman filters in non-uniformly sampled multirate systems: For FDI and beyond
This paper consists of two parts. The first part is the development of a datadriven Kalman filter for a non-uniformly sampled multirate (NUSM) system, including identification of ...
Weihua Li, Sirish L. Shah, Deyun Xiao
86
Voted
CORR
2008
Springer
80views Education» more  CORR 2008»
14 years 11 months ago
Multi-Layer Perceptrons and Symbolic Data
In some real world situations, linear models are not sufficient to represent accurately complex relations between input variables and output variables of a studied system. Multila...
Fabrice Rossi, Brieuc Conan-Guez
JCP
2008
121views more  JCP 2008»
14 years 11 months ago
Algorithms for Identifying the Multiple Syntactic Categories and Meanings of the Word Over
The word over, among others, is associated with a great variety of syntactic categories and meanings. Although over has received attention from scholars in different frameworks for...
Yukiko Sasaki Alam