Sciweavers

2702 search results - page 253 / 541
» Practically Applicable Formal Methods
Sort
View
ICC
2007
IEEE
15 years 6 months ago
Interference Handling in UWB Versus 802.11n Networks
Abstract-- UWB and 802.11n have both been touted as technologies for next generation wireless networks. UWB exploiting a large bandwidth, and 802.11n utilizing MIMO, demonstrate hi...
Arjunan Rajeswaran, Gyouhwan Kim, Rohit Negi, Sai ...
CISC
2008
Springer
152views Cryptology» more  CISC 2008»
15 years 4 months ago
Privacy for Private Key in Signatures
One of the important applications of digital signature is anonymous credential or pseudonym system. In these scenarios, it is essential that the identity of the signer is kept secr...
Qianhong Wu, Bo Qin, Yi Mu, Willy Susilo
AICOM
2005
91views more  AICOM 2005»
15 years 2 months ago
Multiagent systems for cardiac pacing simulation and control
Abstract. Simulating and controlling physiological phenomena are complex tasks to tackle. This is due to the fact that physiological processes are usually described by a set of par...
Francesco Amigoni, Alessandro Beda, Nicola Gatti
FIW
2009
120views Communications» more  FIW 2009»
15 years 7 days ago
Software Security Vulnerabilities Seen As Feature Interactions
The security of software applications is an important domain, and one that mixes formalisms (e.g. when dealing with cryptography and security protocols) with very ad hoc, low level...
Guy-Vincent Jourdan
IS
2012
13 years 10 months ago
On the refactoring of activity labels in business process models
Large corporations increasingly utilize business process models for documenting and redesigning their operations. The extent of such modeling initiatives with several hundred mode...
Henrik Leopold, Sergey Smirnov 0002, Jan Mendling