Sciweavers

251 search results - page 22 / 51
» A Conceptual Activity Cycle-Based Simulation Modeling Method
Sort
View
106
Voted
NIPS
2003
15 years 4 months ago
Reconstructing MEG Sources with Unknown Correlations
Existing source location and recovery algorithms used in magnetoencephalographic imaging generally assume that the source activity at different brain locations is independent or t...
Maneesh Sahani, Srikantan S. Nagarajan
141
Voted
ISF
2008
114views more  ISF 2008»
15 years 2 months ago
An OVAL-based active vulnerability assessment system for enterprise computer networks
Abstract Many security problems are caused by vulnerabilities hidden in enterprise computer networks. It is very important for system administrators to have knowledge about the sec...
Xiuzhen Chen, Qinghua Zheng, Xiaohong Guan
97
Voted
IEEESP
2006
108views more  IEEESP 2006»
15 years 2 months ago
Defining Misuse within the Development Process
abstraction a use case model offers makes it an appropriate startingpointforsoftwaresecurityanalysis and design activities. In contrast, a misuse case describes potential system be...
Gunnar Peterson, John Steven
125
Voted
ET
2000
145views more  ET 2000»
15 years 2 months ago
Fast Test Pattern Generation for Sequential Circuits Using Decision Diagram Representations
The paper presents a novel hierarchical approach to test pattern generation for sequential circuits based on an input model of mixed-level decision diagrams. A method that handles,...
Jaan Raik, Raimund Ubar
107
Voted
WSC
1998
15 years 3 months ago
Integrated Modeling and Analysis Generator Environment (IMAGE): A Decision Support Tool
A truly integrated modeling and analysis environment, which facilitates multi-use and multi-tool models, is necessary for today's enterprises to meet the challenges of the co...
Dursun Delen, Perakath C. Benjamin, Madhav Erragun...