Sciweavers

308 search results - page 49 / 62
» Making Abstract Domains Condensing
Sort
View
SOCIALCOM
2010
14 years 7 months ago
A Decision Theoretic Approach to Data Leakage Prevention
Abstract--In both the commercial and defense sectors a compelling need is emerging for rapid, yet secure, dissemination of information. In this paper we address the threat of infor...
Janusz Marecki, Mudhakar Srivatsa, Pradeep Varakan...
ICST
2009
IEEE
14 years 7 months ago
Proving Functional Equivalence of Two AES Implementations Using Bounded Model Checking
Bounded model checking--as well as symbolic equivalence checking--are highly successful techniques in the hardware domain. Recently, bit-vector bounded model checkers like CBMC ha...
Hendrik Post, Carsten Sinz
JSAC
2011
115views more  JSAC 2011»
14 years 4 months ago
Scalable Cross-Layer Wireless Access Control Using Multi-Carrier Burst Contention
Abstract—The increasing demand for wireless access in vehicular environments (WAVE) supporting a wide range of applications such as traffic safety, surveying, infotainment etc.,...
Bogdan Roman, Ian J. Wassell, Ioannis Chatzigeorgi...
IJWET
2010
86views more  IJWET 2010»
14 years 4 months ago
Semi-automatic financial events discovery based on lexico-semantic patterns
: Due to the market sensitivity to emerging news, investors on financial markets need to continuously monitor financial events when deciding on buying and selling equities. We prop...
Jethro Borsje, Frederik Hogenboom, Flavius Frasinc...
JMLR
2010
143views more  JMLR 2010»
14 years 4 months ago
Incremental Sigmoid Belief Networks for Grammar Learning
We propose a class of Bayesian networks appropriate for structured prediction problems where the Bayesian network's model structure is a function of the predicted output stru...
James Henderson, Ivan Titov