Sciweavers

562 search results - page 35 / 113
» Attack graph generation and analysis
Sort
View
WAW
2004
Springer
80views Algorithms» more  WAW 2004»
14 years 1 months ago
Dominating Sets in Web Graphs
In this paper we study the size of generalised dominating sets in two graph processes which are widely used to model aspects of the world-wide web. On the one hand, we show that gr...
Colin Cooper, Ralf Klasing, Michele Zito
ICDM
2008
IEEE
106views Data Mining» more  ICDM 2008»
14 years 2 months ago
Metropolis Algorithms for Representative Subgraph Sampling
While data mining in chemoinformatics studied graph data with dozens of nodes, systems biology and the Internet are now generating graph data with thousands and millions of nodes....
Christian Hübler, Hans-Peter Kriegel, Karsten...
COST
2009
Springer
121views Multimedia» more  COST 2009»
14 years 2 months ago
Vulnerability Assessment of Fingerprint Matching Based on Time Analysis
A time analysis of a reference minutiae-based fingerprint matching system is presented. We study the relation between the score generated by the system (NFIS2 from NIST) and the t...
Javier Galbally, Sara Carballo, Julian Fiér...
ICDE
2012
IEEE
240views Database» more  ICDE 2012»
11 years 10 months ago
Ego-centric Graph Pattern Census
—There is increasing interest in analyzing networks of all types including social, biological, sensor, computer, and transportation networks. Broadly speaking, we may be interest...
Walaa Eldin Moustafa, Amol Deshpande, Lise Getoor
WWW
2004
ACM
14 years 8 months ago
Towards the composition of Ad Hoc B2B Applications: Semantics, Properties and Complexity Management
The goal is to build a general framework for ad hoc applications over large networks using semantics and complex systems analysis. The first part deals with semantics because appl...
Jaime Delgado, Rosa Gil, Zièd Choukair