Sciweavers

562 search results - page 58 / 113
» Attack graph generation and analysis
Sort
View
DLOG
2008
13 years 10 months ago
Ontology Refinement through Role Assertion Analysis: Example in Pharmacogenomics
We propose an approach for extending domain knowledge represented in DL ontology by using knowledge extraction methods on ontology assertions. Concept and role assertions are extra...
Adrien Coulet, Malika Smaïl-Tabbone, Amedeo N...
INFOCOM
2010
IEEE
13 years 6 months ago
Know Thy Neighbor: Towards Optimal Mapping of Contacts to Social Graphs for DTN Routing
—Delay Tolerant Networks (DTN) are networks of self-organizing wireless nodes, where end-to-end connectivity is intermittent. In these networks, forwarding decisions are generall...
Theus Hossmann, Thrasyvoulos Spyropoulos, Franck L...
ICDE
2007
IEEE
169views Database» more  ICDE 2007»
13 years 11 months ago
Semantic Web Services Composition: A Network Analysis Approach
"Software as a service" approach has become a reality since efforts of both industry and research focused on service integration on the web. It would be possible to see ...
Gokay Burak Akkus
ATMOS
2010
136views Optimization» more  ATMOS 2010»
13 years 6 months ago
An Empirical Analysis of Robustness Concepts for Timetabling
Calculating timetables that are insensitive to disturbances has drawn considerable research efforts due to its practical importance on the one hand and its hard tractability by c...
Marc Goerigk, Anita Schöbel
CORR
2007
Springer
96views Education» more  CORR 2007»
13 years 7 months ago
Understanding the Properties of the BitTorrent Overlay
—In this paper, we conduct extensive simulations to understand the properties of the overlay generated by BitTorrent. We start by analyzing how the overlay properties impact the ...
Anwar Al Hamra, Arnaud Legout, Chadi Barakat