Sciweavers

1358 search results - page 170 / 272
» Proceedings
Sort
View
SCN
2011
Springer
292views Communications» more  SCN 2011»
14 years 11 months ago
Synthesis of attack actions using model checking for the verification of security protocols
Model checking cryptographic protocols have evolved to a valuable method for discovering counterintuitive security flaws, which make possible for a hostile agent to subvert the go...
Stylianos Basagiannis, Panagiotis Katsaros, Andrew...
TSP
2011
125views more  TSP 2011»
14 years 11 months ago
Weight Adjusted Tensor Method for Blind Separation of Underdetermined Mixtures of Nonstationary Sources
—In this paper, a novel algorithm to blindly separate an instantaneous linear underdetermined mixture of nonstationary sources is proposed. It means that the number of sources ex...
Petr Tichavský, Zbynek Koldovský
IHI
2010
124views Healthcare» more  IHI 2010»
14 years 10 months ago
Reliable medical recommendation systems with patient privacy
One of the concerns patients have when confronted with a medical condition is which physician to trust. Any recommendation system that seeks to answer this question must ensure an...
T. Ryan Hoens, Marina Blanton, Nitesh V. Chawla
TEC
2010
162views more  TEC 2010»
14 years 10 months ago
Computational Evolutionary Embryogeny
in HTML. Full version in PDF. 08i YOGEV, O., SHAPIRO, A. A., AND ANTONSSON, E. K. Computational Evolutionary Embryogeny. IEEE Transactions on Evolutionary Computation. Accepted for...
Or Yogev, Andrew A. Shapiro, Erik K. Antonsson
134
Voted
TOG
2010
117views more  TOG 2010»
14 years 10 months ago
Stable inverse dynamic curves
2d animation is a traditional but fascinating domain that has recently regained popularity both in animated movies and video games. This paper introduces a method for automaticall...
Alexandre Derouet-Jourdan, Florence Bertails-Desco...