Sciweavers

3527 search results - page 424 / 706
» Test Automation in Practice
Sort
View
ICITA
2005
IEEE
15 years 9 months ago
Uncovering Attacks on Security Protocols
Security protocols are indispensable in secure communication. We give an operational semantics of security protocols in terms of a Prolog-like language. With this semantics, we ca...
Wuu Yang
94
Voted
ICMCS
2005
IEEE
86views Multimedia» more  ICMCS 2005»
15 years 9 months ago
A Perceptual Performance Measure for Adaptive Echo Cancellers in Packet-Based Telephony
This paper investigates performance measures of adaptive echo cancellers for packet-based telephony. It is shown that steady-state echo return loss enhancement (ERLE) does not acc...
James D. Gordy, Rafik A. Goubran
120
Voted
ICTAI
2005
IEEE
15 years 9 months ago
Improving Lotos Simulation Using Constraint Propagation
Lotos is the ISO formal specification language for describing and verifying concurrent and distributed systems. The simulation or execution of complex Lotos specifications is, h...
Malek Mouhoub, Samira Sadaoui
QEST
2005
IEEE
15 years 9 months ago
An approximation algorithm for labelled Markov processes: towards realistic approximation
Abstract— Approximation techniques for labelled Markov processes on continuous state spaces were developed by Desharnais, Gupta, Jagadeesan and Panangaden. However, it has not be...
Alexandre Bouchard-Côté, Norm Ferns, ...
AE
2005
Springer
15 years 9 months ago
Incorporating Knowledge of Secondary Structures in a L-System-Based Encoding for Protein Folding
An encoding scheme for protein folding on lattice models, inspired by parametric L-systems, was proposed. The encoding incorporates problem domain knowledge in the form of predesig...
Gabriela Ochoa, Gabi Escuela, Natalio Krasnogor