Skip to main content
MITRE logo
Search the site
  • Home
  • Who We Are
    • Who We Are
    • Our Story
    • Our People
  • Our Impact
    • Our Impact
    • R&D Centers
    • MITRE Labs
    • Independent Research
    • Policy and Thought Leadership
    • Intellectual Property
    • Partnerships
    • Publications
  • Focus Areas
    • Focus Areas
    • Aerospace
    • Artificial Intelligence
    • Cybersecurity
    • Defense & Intelligence
    • Government Innovation
    • Health
    • Homeland Security
    • Telecom
    • Transportation
  • News & Insights
  • Careers
  • Contact Us
  • Events
  • Locations
Subscribe to our newsletter

Toolkit menu

MITRE logo
  • Home
  • Search

Search

Site Search

0 Results for: symposium

Enter a keyword to search our website. Or, see News & Insights for our latest stories, publications, news releases, and more.


 

359

Programming Cryptographic Protocols

Publication
August 04, 2004
… Abadi and Cédric Fournet. Mobile values, new names, and secure communication. In 28th ACM Symposium on Principles of Programming Languages (POPL ’01), pages 104–115, January 2001. [4] … Joan Feigenbaum, and Jack Lacy. Dis- tributed trust management. In Proceedings, 1996 IEEE Symposium on Security and Privacy, pages 164–173, May 1997. [10] Michele Boreale. Symbolic trace … Winsbor- ough. Design of a role-based trust management frame- work. In Proceedings, 2002 IEEE Symposium on Secu- rity and Privacy, pages 114–130. May, IEEE Computer Society Press, 2002. [23] …

Cross-Tool Semantics for Protocol Security Goals

Publication
June 03, 2016
… Abadi and Cédric Fournet. Mobile values, new names, and secure communication. In 28th ACM Symposium on Principles of Programming Languages (POPL ’01), pages 104– 115, January 2001. 2. A. … Formal analysis of ikev1 and ikev2. In Computer Security - ESORICS 2011 - 16th European Symposium on Research in Computer Security, Leuven, Belgium, September 12-14, 2011. Proceedings, … the Internet Key Exchange protocol using the NRL protocol analyzer. In Proceedings, 1999 IEEE Symposium on Security and Privacy. IEEE CS Press, May 1999. 26. Dale Miller. Encryption as an …

Positional Paper on a Semantic Web for Life Sciences

Publication
October 04, 2004
… Semantic Similarity Measures as Tools for Exploring the Gene Ontology. In 8th Pacific Symposium on Biocomputing (PSB), pages 601-612, 2003. E.B. Camon, D.G. Barrell, E.C. Dimmer, V. …

Discriminating Gender on Twitter

Publication
May 01, 2011
… age. In Computa- tional Approaches to Analyzing Weblogs: Papers from the 2006 AAAI Spring Symposium. AAAI Press. Chris Callison-Burch and Mark Dredze. 2010. Creating speech and language … blogging. In Computational Approaches to Analyzing Weblogs: Papers from the 2006 AAAI Spring Symposium. AAAI Press, March. Robin Wauters. 2010. Only 50% of Twitter mes- sages are in English, …

Composable Bounds on Information Flow from Distribution Differences

Publication
October 09, 2015
… leakage using generalized gain functions. In Proc. 25th Computer Security Foundations Symposium (CSF 2012), 2012. 3. Christian Cachin. Entropy Measures and Unconditional Security in … D. Rowe. A cut principle for information flow. In Proc. 28th Computer Security Foundations Symposium (CSF 2015). IEEE, July 2015. 12. Boris Köpf and David Basin. An information-theoretic …

Developmental and Operational Processes for Agent-Oriented Database Navigation for Knowledge Discovery

Publication
October 01, 2003
… Coordination Agents: A Self Configurable Agent Architecture”, 5th IEEE International Symposium of Autonomous Decentralized Systems (ISADS2001), pp 271-278, Dallas, TX March 2001 [3] … Normalizing for the Effects of Weather”, 4th USA/Europe Air Traffic Management R&D Symposium, Sante Fe, Dec 3- 7. http://atm2001.eurocontrol.fr/finalpapers/pap94.pdf [8] Fayyad, …

A Decomposition of UAV-Related Situation Awareness

Publication
October 01, 2005
… Environments. In Proceedings of the 2005 Command and Control Research and Technology Symposium. Department of Defense Command and Control Research Program: McLean, VA, June 2005. [2] … awareness metrics.” Proceedings of the 2002 Command and Control Research and Technology Symposium, Monterey, CA., 2002 [15] Scholtz, J. Theory and evaluation of human-robot …

Modeling and Simulation, Experimentation, and Wargaming—Assessing a Common Landscape

Publication
August 03, 2016
… R. Grabowski, and S. Cook, “Auton- omy, trust, and transportation,” in 2014 AAAI Spring Symposium Series, 2014. c©The MITRE Corporation. ALL RIGHTS RESERVED. Approved for Public … simulations,” in Cluster, Cloud and Grid Computing (CCGrid), 2012 12th IEEE/ACM International Symposium on, pp. 873–879, IEEE, 2012. c©The MITRE Corporation. ALL RIGHTS RESERVED. Approved for …

Novel Timing Antennas for Improved GNSS Resilience

Publication
March 01, 2018
… "Prediction of the time accuracy and integrity of GPS timing," in IEEE Frequency and Control Symposium, 1995. [9] I. T. McMichael, E. T. Lundberg, D. L. Hanna and F. S. Kolak, "A Horizon … Hanna and S. Best, "Horizon nulling helix antennas for GPS timing," in 2017 IEEE International Symposium on Antennas and Propagation & USNC/URSI National Radio Science Meeting, San Diego, CA, …

A Flexible and Generic Data Quality Metamodel

Publication
October 01, 2007
… & Service Oriented Architecture”, Proceedings of the MIT 2007 Information Quality Industry Symposium, July 2007, Cambridge, MA, pp 592-622. [6] Cui, Y., Widom, J., “Lineage Tracing for … for Enterprise Interoperability”, Proceedings of the MIT 2007 Information Quality Industry Symposium, July 2007, Cambridge, MA, pp 798-822. [12] Olsen, J. E., Data Quality – The Accuracy …
  • First page
  • Previous page
  • …
  • Page 6
  • Page 7
  • Page 8
  • Page 9
  • Current page 10
  • Page 11
  • Page 12
  • Page 13
  • Page 14
  • …
  • Next page
  • Last page
Displaying 91 - 100 of 359
MITRE logo

Subscribe to the MITRE 360 newsletter.

Footer links

  • Contact Us
  • Locations
  • Careers
  • Disclosures
  • Privacy Policy
  • Terms of Use
  • Manage Cookies
  • Partnership Network Login
  • Remote Access Login

Footer social links