Sciweavers

247 search results - page 30 / 50
» Discourse analysis: making complex methodology simple
Sort
View
187
Voted
SCN
2011
Springer
292views Communications» more  SCN 2011»
14 years 10 months ago
Synthesis of attack actions using model checking for the verification of security protocols
Model checking cryptographic protocols have evolved to a valuable method for discovering counterintuitive security flaws, which make possible for a hostile agent to subvert the go...
Stylianos Basagiannis, Panagiotis Katsaros, Andrew...
TOOLS
1999
IEEE
15 years 8 months ago
Towards Integration of State Machines and Object-Oriented Languages
The goal of this paper is to obtain a one-to-one correspondence between state machines as e.g. used in UML and object-oriented programming languages. A proposal is made for a lang...
Ole Lehrmann Madsen
113
Voted
ISF
2007
119views more  ISF 2007»
15 years 3 months ago
Managing the false alarms: A framework for assurance and verification of surveillance monitoring
This article discusses methods to support assurance of surveillance monitoring; and compliance verification knowledge management (CV-KM). The discussion includes aspects of primar...
Peter Goldschmidt
149
Voted
ICASSP
2011
IEEE
14 years 7 months ago
Simplified EM channel estimation in LTE systems
In this paper, an iterative channel estimation algorithm is considered in LTE systems. A simplified expectation maximization (EM) based algorithm is proposed for channel estimati...
Yang Liu, Serdar Sezginer
116
Voted
SIGIR
2005
ACM
15 years 9 months ago
Bootstrapping dictionaries for cross-language information retrieval
The bottleneck for dictionary-based cross-language information retrieval is the lack of comprehensive dictionaries, in particular for many different languages. We here introduce a...
Kornél G. Markó, Stefan Schulz, Olen...