Skip to main content
MITRE logo
Search the site
  • Home
  • Who We Are
    • Who We Are
    • Our Story
    • Our People
  • Our Impact
    • Our Impact
    • R&D Centers
    • MITRE Labs
    • Independent Research
    • Policy and Thought Leadership
    • Intellectual Property
    • Partnerships
    • Publications
  • Focus Areas
    • Focus Areas
    • Aerospace
    • Artificial Intelligence
    • Cybersecurity
    • Defense & Intelligence
    • Government Innovation
    • Health
    • Homeland Security
    • Telecom
    • Transportation
  • News & Insights
  • Careers
  • Contact Us
  • Events
  • Locations
Subscribe to our newsletter

Toolkit menu

MITRE logo
  • Home
  • Search

Search

Site Search

0 Results for: symposium

Enter a keyword to search our website. Or, see News & Insights for our latest stories, publications, news releases, and more.


 

359

Biologically Inspired Methods for Agile Command and Control (BIO C2)

Publication
July 01, 2006
… netted sensors in Command and Control Enterprises. Command and Control Research and Technology Symposium (CCRTS) June 20-22, 2006. Miller, S.D., Haddock, S.H.D., Elvidge, C.D., Lee, T.F. 2005. …

Adapting Peer-to-Peer Topologies to Improve System Performance

Publication
November 01, 2003
… in an Internet-Scale Event Notification Service”, Proceedings of the Nineteenth Annual ACM Symposium on Principles of Distributed Computing, Portland OR, USA, July 2000, pp. 219-227. [6] … P. Raghavan, and E. Upfal, “Building Low-Diameter P2P Networks”, Proceedings of the IEEE Symposium on Foundations of Computer Science, 2001. [17] M. Ripeanu, I. Foster, and A. Iamnitchi, …

Using Component-Based Development and Web Technologies to Support a Distributed Data Management System*

Publication
August 01, 2001
… Approach to Data Extraction using an Autonomous Decentralized Architecture, 5th International Symposium of Autonomous Decentralized Systems (ISADS2001), Dallas, Texas March 2001 [3] Blake, … MA, 1998 [5] Bronsard, F, et al “Toward Software Plug-and-Play” Proceedings of the 1997 Symposium on software reusability, 1997 Pages 19-29 [6] Garlan, D. and Shaw, M., Software …

Optimal Multichannel Blind Deconvolution for Parameterized Channels and Known Source Densities (EDICS:SSP-SSEP)

Publication
June 01, 2005
… algorithms for blind deconvolution using the natural gradient approach,” IEEE 11th IFAC Symposium on System Identification, July 1997. [5] S. Douglas, H. Sawada, and S. Makino, “Natural … and Information Policy (CCIP). Dr. Zaghloul is the general chair of the ”IEEE International Symposium on Antennas and Propagation and USNC/URSI Meeting,” Washington, D.C., July 2005. …

Using Transcription and Replay in Analysis of Groupware Applications

Publication
June 01, 2006
… S. Feiner (1992). A history-based macro by example system. Proceedings of the 5th annual ACM symposium on User interface software and technology, Monteray, California, United States, ACM … A Capture/Replay tool for observation-based testing. Proceedings of the International Symposium on Software Testing and Analysis, Portland, Oregon, United States, ACM Press. Suchman, …

Modeling Risk-Based Approach for Small Unmanned Aircraft Systems

Publication
July 18, 2018
… Part 107; Summary (June 21, 2016): https://www.faa.gov/uas/media/Part_107_Summary.pdf [2] UAS Symposium 2017 (Wes Ryan/FAA AIR-600) [Online] https://www.faa.gov/uas/resources/event_archive/2017_uas_symposium/media/Workshop_10_Type_and_Airworthiness_Ce rtifications.pdf [3] Aalmoes, R., et al., …

A Hybrid Analysis for Security Protocols with State

Publication
July 25, 2014
… systems and its application to trusted computing. In Security and Privacy, 2009 30th IEEE Symposium on, pages 221–236. IEEE, 2009. [10] Stéphanie Delaune, Steve Kremer, Mark D Ryan, and … D. Ryan, and Graham Steel. Formal analysis of protocols based on TPM state registers. In IEEE Symposium on Computer Security Foundations. IEEE CS Press, June 2011. [12] Sibylle Fröschle and …

Engineering Enterprise Systems: Challenges and Prospects

Publication
May 01, 2006
… Design, Engineering Systems Monograph, MIT, March 29-31, 2004. Available at http://esd.mit.edu/symposium/pdfs/monograph/uncertainty.pdf. The author points out that much of the uncertainty that … engineering systems comes from other than purely technological factors. 17 http://esd.mit.edu/symposium/pdfs/monograph/uncertainty.pdf addressing them helps to frame objectives and develop …

Filtering Postures: Local Enforcement for Global Policies

Publication
May 01, 1998
… States Army CECOM contract DAAB 07-96-C-E601. This paper appears in the Proceedings, 1997 IEEE Symposium on Security and Privacy. While we use the vocabulary of TCP/IP, the ideas and meth- ods … compiler for Scheme. SIGPLAN Notices, 21(7):219–233, June 1986. Proceedings of the ’86 Symposium on Compiler Construction. [11] Network Systems Corporation, Minneapolis, MN. The Se- …

Identification of Duplicate News Stories in Web Pages

Publication
March 01, 2008
… techniques from rounding algorithms. In STOC ’02: Proceedings of the thirty-fourth annual ACM symposium on Theory of computing. New York, NY, USA: ACM. Chowdhury, Abdur, Ophir Frieder, David … Metanews: An information agent for gathering news articles on the web. In Interna- tional Symposium on Methodologies for Intelligent Sys- tems. Knoblock, C., K. Lerman, S. Minton, and I. …
  • First page
  • Previous page
  • …
  • Page 8
  • Page 9
  • Page 10
  • Page 11
  • Current page 12
  • Page 13
  • Page 14
  • Page 15
  • Page 16
  • …
  • Next page
  • Last page
Displaying 111 - 120 of 359
MITRE logo

Subscribe to the MITRE 360 newsletter.

Footer links

  • Contact Us
  • Locations
  • Careers
  • Disclosures
  • Privacy Policy
  • Terms of Use
  • Manage Cookies
  • Partnership Network Login
  • Remote Access Login

Footer social links