Sciweavers

247 search results - page 30 / 50
» Discourse analysis: making complex methodology simple
Sort
View
117
Voted
SCN
2011
Springer
292views Communications» more  SCN 2011»
14 years 4 months ago
Synthesis of attack actions using model checking for the verification of security protocols
Model checking cryptographic protocols have evolved to a valuable method for discovering counterintuitive security flaws, which make possible for a hostile agent to subvert the go...
Stylianos Basagiannis, Panagiotis Katsaros, Andrew...
90
Voted
TOOLS
1999
IEEE
15 years 1 months ago
Towards Integration of State Machines and Object-Oriented Languages
The goal of this paper is to obtain a one-to-one correspondence between state machines as e.g. used in UML and object-oriented programming languages. A proposal is made for a lang...
Ole Lehrmann Madsen
ISF
2007
119views more  ISF 2007»
14 years 9 months ago
Managing the false alarms: A framework for assurance and verification of surveillance monitoring
This article discusses methods to support assurance of surveillance monitoring; and compliance verification knowledge management (CV-KM). The discussion includes aspects of primar...
Peter Goldschmidt
ICASSP
2011
IEEE
14 years 1 months ago
Simplified EM channel estimation in LTE systems
In this paper, an iterative channel estimation algorithm is considered in LTE systems. A simplified expectation maximization (EM) based algorithm is proposed for channel estimati...
Yang Liu, Serdar Sezginer
73
Voted
SIGIR
2005
ACM
15 years 3 months ago
Bootstrapping dictionaries for cross-language information retrieval
The bottleneck for dictionary-based cross-language information retrieval is the lack of comprehensive dictionaries, in particular for many different languages. We here introduce a...
Kornél G. Markó, Stefan Schulz, Olen...