Sciweavers

3193 search results - page 111 / 639
» A Security Risk Analysis Model for Information Systems
Sort
View
ICDAR
2009
IEEE
13 years 8 months ago
Lexicon-Based Word Recognition Using Support Vector Machine and Hidden Markov Model
Hybrid of Neural Network (NN) and Hidden Markov Model (HMM) has been popular in word recognition, taking advantage of NN discriminative property and HMM representational capabilit...
Abdul Rahim Ahmad, Christian Viard-Gaudin, Marzuki...
POPL
2006
ACM
14 years 10 months ago
Decidability and proof systems for language-based noninterference relations
Noninterference is the basic semantical condition used to account for confidentiality and integrity-related properties in programming languages. There appears to be an at least im...
Mads Dam
ECIS
2000
13 years 11 months ago
Modeling the Dialogue Aspects of an Information System
- In this paper we investigate techniques offered by current object-oriented development methods for the specification of the user-system dialogue aspect of a software system. Curr...
Monique Snoeck, Guido Dedene
CSFW
2007
IEEE
14 years 4 months ago
Comparing Countermeasures against Interrupt-Related Covert Channels in an Information-Theoretic Framework
Interrupt-driven communication with hardware devices can be exploited for establishing covert channels. In this article, we propose an information-theoretic framework for analyzin...
Heiko Mantel, Henning Sudbrock
TCOM
2010
141views more  TCOM 2010»
13 years 5 months ago
Mutual Information Statistics and Beamforming Performance Analysis of Optimized LoS MIMO Systems
Abstract--This paper provides a systematic mutual information (MI) and multichannel beamforming (MBF) characterization of optimized multiple-input multiple-output (MIMO) communicat...
Michail Matthaiou, Paul de Kerret, George K. Karag...