Sciweavers

4757 search results - page 163 / 952
» A Unique
Sort
View
CCS
2006
ACM
15 years 8 months ago
Attack graph generation and analysis
In this paper, we position the correct way of using graphical models for enhancing cyber security analysis in enterprise networks. Graphical models can be powerful in representati...
Jeannette M. Wing
CG
2006
Springer
15 years 8 months ago
A Retrograde Approximation Algorithm for One-Player Can't Stop
Abstract. A one-player, finite, probabilistic game with perfect information can be presented as a bipartite graph. For one-player Can't Stop, the graph is cyclic and the chall...
James Glenn, Haw-ren Fang, Clyde P. Kruskal
CONCUR
2006
Springer
15 years 8 months ago
Liveness, Fairness and Impossible Futures
Impossible futures equivalence is the semantic equivalence on labelled transition systems that identifies systems iff they have the same "AGEF" properties: temporal logic...
Rob J. van Glabbeek, Marc Voorhoeve
ECCV
2000
Springer
15 years 8 months ago
Ambiguous Configurations for 3-View Projective Reconstruction
The critical configurations for projective reconstruction from three views are discussed. A set of cameras and points is said to be critical if the projected image points are insu...
Richard I. Hartley
ESOP
2000
Springer
15 years 8 months ago
Improving the Representation of Infinite Trees to Deal with Sets of Trees
In order to deal efficiently with infinite regular trees (or other pointed graph structures), we give new algorithms to store such structures. The trees are stored in such a way th...
Laurent Mauborgne