Sciweavers

562 search results - page 108 / 113
» Attack graph generation and analysis
Sort
View
VSTTE
2005
Springer
14 years 1 months ago
Model Checking: Back and Forth between Hardware and Software
The interplay back and forth between software model checking and hardware model checking has been fruitful for both. Originally intended for the analysis of concurrent software, mo...
Edmund M. Clarke, Anubhav Gupta, Himanshu Jain, He...
GECCO
2008
Springer
107views Optimization» more  GECCO 2008»
13 years 8 months ago
The influence of scaling and assortativity on takeover times in scale-free topologies
In evolving systems, the topological characteristics of population structure have a pronounced impact on the rate of spread of advantageous alleles, and therefore affect selective...
Joshua L. Payne, Margaret J. Eppstein
BMCBI
2010
145views more  BMCBI 2010»
13 years 7 months ago
JCoDA: a tool for detecting evolutionary selection
Background: The incorporation of annotated sequence information from multiple related species in commonly used databases (Ensembl, Flybase, Saccharomyces Genome Database, Wormbase...
Steven N. Steinway, Ruth Dannenfelser, Christopher...
ICDAR
2011
IEEE
12 years 7 months ago
Ternary Entropy-Based Binarization of Degraded Document Images Using Morphological Operators
—A vast number of historical and badly degraded document images can be found in libraries, public, and national archives. Due to the complex nature of different artifacts, such p...
T. Hoang Ngan Le, Tien D. Bui, Ching Y. Suen
WWW
2006
ACM
14 years 8 months ago
Site level noise removal for search engines
The currently booming search engine industry has determined many online organizations to attempt to artificially increase their ranking in order to attract more visitors to their ...
André Luiz da Costa Carvalho, Paul-Alexandr...