Sciweavers

819 search results - page 133 / 164
» Fractal symbolic analysis
Sort
View
CCS
2010
ACM
13 years 10 months ago
Accountability: definition and relationship to verifiability
Many cryptographic tasks and protocols, such as non-repudiation, contract-signing, voting, auction, identity-based encryption, and certain forms of secure multi-party computation,...
Ralf Küsters, Tomasz Truderung, Andreas Vogt
IJDAR
2006
103views more  IJDAR 2006»
13 years 10 months ago
Table-processing paradigms: a research survey
Tables are a ubiquitous form of communication. While everyone seems to know what a table is, a precise, analytical definition of "tabularity" remains elusive because some...
David W. Embley, Matthew Hurst, Daniel P. Lopresti...
INFSOF
2007
83views more  INFSOF 2007»
13 years 9 months ago
On the design of more secure software-intensive systems by use of attack patterns
Retrofitting security implementations to a released software-intensive system or to a system under development may require significant architectural or coding changes. These late...
Michael Gegick, Laurie Williams
TWC
2008
106views more  TWC 2008»
13 years 9 months ago
Cooperative communications protocol for multiuser OFDM networks
This paper proposes a relay-based scheme where a fixed number of relays are utilized to design an OFDM cooperative protocol. By exploiting limited feedback from the destination ter...
W. Pam Siriwongpairat, Ahmed K. Sadek, K. J. Ray L...
KBS
2002
106views more  KBS 2002»
13 years 9 months ago
Hybrid decision tree
In this paper, a hybrid learning approach named HDT is proposed. HDT simulates human reasoning by using symbolic learning to do qualitative analysis and using neural learning to d...
Zhi-Hua Zhou, Zhaoqian Chen