Sciweavers

1532 search results - page 66 / 307
» An analysis of additivity in OLAP systems
Sort
View
JOC
2011
157views more  JOC 2011»
13 years 4 months ago
Universally Composable Symbolic Security Analysis
In light of the growing complexity of cryptographic protocols and applications, it becomes highly desirable to mechanize — and eventually automate — the security analysis of p...
Ran Canetti, Jonathan Herzog
CDC
2009
IEEE
148views Control Systems» more  CDC 2009»
14 years 1 months ago
Robust extended Kalman filter based nonlinear model predictive control formulation
— The analysis of the EKF error sequence in [1] is expanded to the case with non-vanishing perturbations. The robust stability of NMPC and EKF pair is established. In addition, w...
Rui Huang, Sachin C. Patwardhan, Lorenz T. Biegler
ESEC
1997
Springer
14 years 1 months ago
Verification of Liveness Properties Using Compositional Reachability Analysis
The software architecture of a distributed program can be represented by a hierarchical composition of subsystems, with interacting processes at the leaves of the hierarchy. Compo...
Shing-Chi Cheung, Dimitra Giannakopoulou, Jeff Kra...
CVPR
2012
IEEE
11 years 11 months ago
Leveraging stereopsis for saliency analysis
Stereopsis provides an additional depth cue and plays an important role in the human vision system. This paper explores stereopsis for saliency analysis and presents two approache...
Yuzhen Niu, Yujie Geng, Xueqing Li, Feng Liu
EUC
2008
Springer
13 years 10 months ago
A Qualitative Risk Analysis for the GPRS Technology
This paper presents a qualitative risk analysis of the General Packet Radio Service (GPRS) technology. GPRS presents several essential security weaknesses which may lead to securi...
Christos Xenakis, Danae Apostolopoulou, Angeliki P...