Skip to main content
MITRE logo
Search the site
  • Home
  • Who We Are
    • Who We Are
    • Our Story
    • Our People
  • Our Impact
    • Our Impact
    • R&D Centers
    • MITRE Labs
    • Independent Research
    • Policy and Thought Leadership
    • Intellectual Property
    • Partnerships
    • Publications
  • Focus Areas
    • Focus Areas
    • Aerospace
    • Artificial Intelligence
    • Cybersecurity
    • Defense & Intelligence
    • Government Innovation
    • Health
    • Homeland Security
    • Telecom
    • Transportation
  • News & Insights
  • Careers
  • Contact Us
  • Events
  • Locations
Subscribe to our newsletter

Toolkit menu

MITRE logo
  • Home
  • Search

Search

Site Search

0 Results for: symposium

Enter a keyword to search our website. Or, see News & Insights for our latest stories, publications, news releases, and more.


 

359

Call by Contract for Cryptographic Protocols

Publication
June 01, 2006
… [1] M. Backes and B. Pfitzmann. Relating symbolic and cryptographic se- crecy. In IEEE Symposium on Security and Privacy, pages 171–182. IEEE Computer Society, 2005. [2] M. Bartoletti, … C. Meadows, and P. Syverson. Evironmental requirements for authentication protocols. In Symposium on Requirements Engineering for Information Security, March 2001. 17 [5] Stefano Ceri, … Jonathan Herzog, John Ramsdell, and Brian Sniffen. Programming cryptographic protocols. In Symposium on Trusted Global Computing, volume 3705 of Lecture Notes in Computer Science. …

Delivering Mission Outcomes Through Digital Transformation: Ways to Accelerate Technology

Publication
September 22, 2020
… positions. See https://www.mitre.org/sites/default/ files/publications/PR-18-3746-Symposium-Federal- Workforce-21st-Century-Report.pdf 5. Future PMA Focus The current President’s … NUMBER 20-2522 mitre.org https://www.mitre.org/sites/default/files/publications/PR-18-3746-Symposium-Federal-Workforce-21st-Century-Report.pdf … https://www.mitre.org/sites/default/files/publications/PR-18-3746-Symposium-Federal-Workforce-21st-Century-Report.pdf mailto:policy@mitre.org http://mitre.org …

Integrating M&S Representation of the Natural Environment into a C4ISR System for Decision Support

Publication
January 01, 2000
… H. Samet: “Spatial database programming using SAND” Proceedings of the Seventh International Symposium on Spatial Data Handling, volume 2, Pages A29 - A42, Delft, The Netherlands, August … the Natural Environment into a GIS for Decision Support” Proceedings of the 7th International Symposium on Geographic Information Systems, Pages 73 – 78, 1999. [8] G. Iwerks and H. Samet: … from the C4ISR Cooperative Research Program Command and Control Research and Technology Symposium, United States Naval War College, Newport, RI, June 29 – June 1, 1999. [11] OMG: …

BIOS Chronomancy: Fixing the Core Root of Trust for Measurement

Publication
December 20, 2013
… OSLO: improving the security of trusted computing. In Proceedings of 2007 USENIX Security Symposium on USENIX Security Symposium. [17] X. Kovah, C. Kallenberg, C. Weathers, A. Herzog, M. Albin, and J. Butterworth. New results for timing-based attestation. In Proceedings of the 2012 IEEE Symposium on Security and Privacy. [18] Y. Li, J. M. McCune, and A. Perrig. SBAP: Software-Based …

Patterns of Pathogenesis

Publication
March 01, 2007
… on their own. This work is described in a paper that has been accepted at the Pacific Symposium for BioComputing (Morgan et. al., 2007). The paper describes a set of experiments that … Hirschman, “Linking Biomedical Information Through Text Mining: Session Introduction,” Pacific Symposium on Biocomputing 11:1-3(2006). 16. L. Hirschman and C. Blaschke, “Evaluation of Text … Human Gene And Protein Mention Normalization To Unique Identifiers," accepted by Pacific Symposium on Biocomputing, 2007. 20. Wellner, B. Huyck, J., Mardis, S., Aberdeen, J., Morgan, A., …

Obligations in Trust Negotiation

Publication
February 01, 2008
… [7] Manuel Hilty, David Basin, and Alexander Pretschner. On obligations. In 10th European Symposium on Research in Computer Security (ESORICS 2005), volume 3679 of LNCS, pages 98–117. … policies for mission-based information sharing. In SACMAT ’06: Proceedings of the 11th ACM Symposium on Access Control Models and Technologies, pages 210–218. ACM Press, 2006. [11] Martin … authorization service for open systems. In SACMAT ’06: Proceedings of the Eleventh ACM Symposium on Access Control Models and Technologies, 2006. [13] Jiangtao Li, Ninghui Li, and …

Minimum-Cost First-Push-Then-Pull Gossip Algorithm

Publication
November 01, 2011
… C. Schindelhauer, S. Shenker, and B. V¨ocking. Randomized rumor spreading. Proceedings of 41st Symposium on Foundations of Computer Science (FOCS), 2000, pp. 565–574. [4] D. Agrawal, A. El … “Epidemic algorithms in replicated databases (extended abstract),” in Proceedings of the 16th Symposium on Principles of Database Systems (PODS), 1997, pp. 161– 172. [5] David Kempe, Alin … and Johannes Gehrke. Gossip-based computation of aggregate information. In 44th Annual IEEE Symposium on Foundations of Computer Science, Cambridge, MA, USA, 2003. IEEE Computer Society. …

A Utility Accrual Scheduling Algorithm for Real-Time Activities With Mutual Exclusion Resource Constraints

Publication
April 04, 2004
… scheduling algorithm for overloaded real-time systems,” in Proc. IEEE Real-Time Systems Symposium, December 1992, pp. 290–299. [8] D. Mosse, M. E. Pollack, and Y. Ronen, “Value-density … 2003. [14] G. Le Lann, “Predictability in critical systems,” in Symposium on Formal Techniques in Real-Time and Fault-Tolerant Systems (Lecture Notes in Computer … supporting benefit-based proactive resource allocation,” in Proc. of IEEE International Symposium on Object-oriented Real-time distributed Computing, May 2003, pp. 292–299. [18] W. …

Tracking Moving Ground Targets from Airborne SAR via Keystoning and Multiple Phase Center Interferometry

Publication
February 01, 2007
… Targets in SAR via Keystoning and Multiple Phase Center Interferometry’, IEEE-2006 Radar Symposium, Verona, NY, April 2006 [6] Zasada, Perry and Sanyal, ‘Detecting Moving Targets in … SAR via Keystoning and Multiple Phase Center Interferometry’, SPIE Defense and Security Symposium 17-21 April in Orlando, Florida. …

Principles of Adaptive Space-Time-Polarization Cancellation of Broadband Interference

Publication
January 04, 2004
… in an Interference Environment,” Proc. IEEE 2000 Precision Location and Navigation Symposium, pp. 37-40,2000 (ISBN: 0-7803-5872-4, IEEE Cat. No. 00CH37062). 20. I. Gupta and A. … D. Blejer, “Mutual Coupling Analyses for Small GPS Adaptive Arrays,” IEEE SP-S International Symposium, Vol. 4, pp. 38-41, 2001. 22. E. Ngai, D. Blejer, T. Phuong, and J. Herd, “Anti-Jam Performance of Small GPS Polarimetric Arrays,” IEEE AP-S International Symposium, pp. 128-131, 2002. 23. I. Gupta, private communication at the Ohio State University, …
  • First page
  • Previous page
  • Page 1
  • Page 2
  • Page 3
  • Page 4
  • Current page 5
  • Page 6
  • Page 7
  • Page 8
  • Page 9
  • …
  • Next page
  • Last page
Displaying 41 - 50 of 359
MITRE logo

Subscribe to the MITRE 360 newsletter.

Footer links

  • Contact Us
  • Locations
  • Careers
  • Disclosures
  • Privacy Policy
  • Terms of Use
  • Manage Cookies
  • Partnership Network Login
  • Remote Access Login

Footer social links