Sciweavers

6253 search results - page 364 / 1251
» Use Case Modeling Guidelines
Sort
View
EUROPKI
2009
Springer
15 years 2 months ago
Validity Models of Electronic Signatures and Their Enforcement in Practice
Abstract. An electronic signature is considered to be valid, if the signature is mathematically correct and if the signer's public key is classified as authentic. While the fi...
Harald Baier, Vangelis Karatsiolis
CORR
2006
Springer
81views Education» more  CORR 2006»
15 years 4 months ago
Universal Filtering via Hidden Markov Modeling
The problem of discrete universal filtering, in which the components of a discrete signal emitted by an unknown source and corrupted by a known discrete memoryless channel (DMC) ar...
Taesup Moon, Tsachy Weissman
ICASSP
2009
IEEE
15 years 11 months ago
Bounded conditional mean imputation with Gaussian mixture models: A reconstruction approach to partly occluded features
In this work we show how conditional mean imputation can be bounded through the use of box-truncated Gaussian distributions. That is of interest when signals or features are partl...
Friedrich Faubel, John W. McDonough, Dietrich Klak...
CEC
2005
IEEE
15 years 10 months ago
Modeling and analysis of indirect communication in particle swarm optimization
Abstract- Particle Swarm Optimization (PSO) has successfully been applied to many optimization problems. One particularly interesting aspect of these algorithms is to study the com...
S. Helwig, Christian Haubelt, Jürgen Teich
LICS
2005
IEEE
15 years 10 months ago
Model-Checking Hierarchical Structures
Hierarchical graph definitions allow a modular description of graphs using modules for the specification of repeated substructures. Beside this modularity, hierarchical graph de...
Markus Lohrey