Sciweavers

1888 search results - page 183 / 378
» Proof theory and computational analysis
Sort
View
115
Voted
VIROLOGY
2010
162views more  VIROLOGY 2010»
14 years 11 months ago
Applied parallel coordinates for logs and network traffic attack analysis
By looking on how computer security issues are handled today, dealing with numerous and unknown events is not easy. Events need to be normalized, abnormal behaviors must be describ...
Sébastien Tricaud, Philippe Saadé
102
Voted
CLEF
2009
Springer
14 years 10 months ago
Unsupervised Morphological Analysis by Formal Analogy
Abstract. While classical approaches to unsupervised morphology acquisition often rely on metrics based on information theory for identifying morphemes, we describe a novel approac...
Jean-François Lavallée, Philippe Lan...
136
Voted
CORR
2011
Springer
189views Education» more  CORR 2011»
14 years 7 months ago
Analysis of multi-stage open shop processing systems
We study algorithmic problems in multi-stage open shop processing systems that are centered around reachability and deadlock detection questions. We characterize safe and unsafe s...
Christian Eggermont, Alexander Schrijver, Gerhard ...
119
Voted
TCOM
2010
141views more  TCOM 2010»
14 years 7 months ago
Mutual Information Statistics and Beamforming Performance Analysis of Optimized LoS MIMO Systems
Abstract--This paper provides a systematic mutual information (MI) and multichannel beamforming (MBF) characterization of optimized multiple-input multiple-output (MIMO) communicat...
Michail Matthaiou, Paul de Kerret, George K. Karag...
216
Voted
POPL
2006
ACM
16 years 1 months ago
Engineering with logic: HOL specification and symbolic-evaluation testing for TCP implementations
The TCP/IP protocols and Sockets API underlie much of modern computation, but their semantics have historically been very complex and ill-defined. The real standard is the de fact...
Steve Bishop, Matthew Fairbairn, Michael Norrish, ...