Sciweavers

144 search results - page 5 / 29
» A descriptive study of Microsoft's threat modeling technique
Sort
View
DLOG
2003
13 years 9 months ago
Expressive Description Logics
This chapter covers extensions of the basic description logics introduced in Chapter 2 by very expressive constructs that require advanced reasoning techniques. In particular, we ...
Diego Calvanese, Giuseppe De Giacomo
FASE
2007
Springer
13 years 11 months ago
Finding Environment Guarantees
Abstract. When model checking a software component, a model of the environment in which that component is supposed to run is constructed. One of the major threats to the validity o...
Marsha Chechik, Mihaela Gheorghiu, Arie Gurfinkel
ACSAC
2010
IEEE
13 years 5 months ago
Conficker and beyond: a large-scale empirical study
Conficker [26] is the most recent widespread, well-known worm/bot. According to several reports [16, 28], it has infected about 7 million to 15 million hosts and the victims are s...
Seungwon Shin, Guofei Gu
FDL
2005
IEEE
14 years 1 months ago
Linearly graded behavioural analogue performance models
A concept of linearly graded statistical models for analogue performance evaluation is proposed and a suitable technique for automatic generation of analogue performance models us...
Xianqiang Ren, Tom J. Kazmierski
STOC
2007
ACM
127views Algorithms» more  STOC 2007»
14 years 7 months ago
First to market is not everything: an analysis of preferential attachment with fitness
The design of algorithms on complex networks, such as routing, ranking or recommendation algorithms, requires a detailed understanding of the growth characteristics of the network...
Christian Borgs, Jennifer T. Chayes, Constantinos ...