Although good encryption functions are probabilistic, most symbolic models do not capture this aspect explicitly. A typical solution, recently used to prove the soundness of such ...
This paper describes a method for risk analysis based on the approach used in CRAMM, but instead of using discrete measures for threats and vulnerabilities and lookup tables to de...
Abstract--This paper examines the performance of decisionfeedback-based iterative channel estimation and multiuser detection in channel coded aperiodic direct sequence code divisio...
In this correspondence, the multiple access channel (MAC) with channel state is analyzed in a scenario where a) the channel state is known non-causally to the transmitters and b) t...
A number of serious reasons will convince an increasing amount of researchers to store their relevant material in centers which we will call "language resource archives"...
Peter Wittenburg, Daan Broeder, Wolfgang Klein, St...
A plethora of aspect mechanisms exist today. All of these diverse mechanisms integrate concerns into artifacts that exhibit crosscutting structure. What we lack and need is a char...
We present a novel approach to estimate the time delay between light curves of multiple images in a gravitationally lensed system, based on Kernel methods in the context of machine...
Juan C. Cuevas-Tello, Peter Tino, Somak Raychaudhu...