Sciweavers

1562 search results - page 14 / 313
» A case study in testing a network security algorithm
Sort
View
BVAI
2005
Springer
14 years 26 days ago
Incomplete Contour Representations and Shape Descriptors: ICR Test Studies
Inspired by psychophysical studies of the human cognitive abilities we propose a novel aspect and a method for performance evaluation of contour based shape recognition algorithms ...
Anarta Ghosh, Nicolai Petkov
ICANN
2005
Springer
14 years 27 days ago
CrySSMEx, a Novel Rule Extractor for Recurrent Neural Networks: Overview and Case Study
In this paper, it will be shown that it is feasible to extract finite state machines in a domain of, for rule extraction, previously unencountered complexity. The algorithm used i...
Henrik Jacobsson, Tom Ziemke
ICALP
2009
Springer
14 years 7 months ago
Towards a Study of Low-Complexity Graphs
Abstract. We propose the study of graphs that are defined by lowcomplexity distributed and deterministic agents. We suggest that this viewpoint may help introduce the element of in...
Sanjeev Arora, David Steurer, Avi Wigderson
CHI
2008
ACM
14 years 7 months ago
Integrating statistics and visualization: case studies of gaining clarity during exploratory data analysis
Although both statistical methods and visualizations have been used by network analysts, exploratory data analysis remains a challenge. We propose that a tight integration of thes...
Adam Perer, Ben Shneiderman
IEEEIAS
2007
IEEE
14 years 1 months ago
Team Edit Automata for Testing Security Property
This paper introduces a mathematical model, called Team Edit Automata, for evaluating software security properties. We use the model to describe security properties and their corr...
Zhenrong Yang, Aiman Hanna, Mourad Debbabi