Sciweavers

1518 search results - page 101 / 304
» Cryptographic Test Correction
Sort
View
ACL
1997
15 years 5 months ago
Finite State Transducers Approximating Hidden Markov Models
This paper describes the conversion of a Hidden Markov Model into a sequential transducer that closely approximates the behavior of the stochastic model. This transformation is es...
André Kempe
150
Voted
ISLPED
2003
ACM
197views Hardware» more  ISLPED 2003»
15 years 9 months ago
Analyzing the energy consumption of security protocols
Security is critical to a wide range of wireless data applications and services. While several security mechanisms and protocols have been developed in the context of the wired In...
Nachiketh R. Potlapally, Srivaths Ravi, Anand Ragh...
145
Voted
DGO
2007
174views Education» more  DGO 2007»
15 years 5 months ago
New techniques for ensuring the long term integrity of digital archives
A large portion of the government, business, cultural, and scientific digital data being created today needs to be archived and preserved for future use of periods ranging from a ...
Sangchul Song, Joseph JáJá
129
Voted
DIMACS
1996
15 years 5 months ago
Model Checking and the Mu-calculus
There is a growing recognition of the need to apply formal mathematical methods in the design of \high con dence" computing systems. Such systems operate in safety critical co...
E. Allen Emerson
129
Voted
ICSE
2007
IEEE-ACM
16 years 3 months ago
STRADA: A Tool for Scenario-Based Feature-to-Code Trace Detection and Analysis
Software engineers frequently struggle with understanding the relationships between the source code of a system and its requirements or high-level features. These relationships ar...
Alexander Egyed, Gernot Binder, Paul Grünbach...