Sciweavers

562 search results - page 70 / 113
» Attack graph generation and analysis
Sort
View
FM
2006
Springer
146views Formal Methods» more  FM 2006»
13 years 11 months ago
Formal Modeling of Communication Protocols by Graph Transformation
Formal modeling is a crucial first step in the analysis of safety critical communication protocols such as IP Telephony. These protocols are notoriously resistant to formal modelin...
Zarrin Langari, Richard J. Trefler
ICPR
2004
IEEE
14 years 8 months ago
A System to Detect Houses and Residential Street Networks in Multispectral Satellite Images
ACT Maps are vital tools for most government agencies and consumers. However, their manual generation and updating is tedious and time consuming. As a step toward automatic map gen...
Cem Ünsalan, Kim L. Boyer
ICML
2006
IEEE
14 years 8 months ago
Discriminative cluster analysis
Clustering is one of the most widely used statistical tools for data analysis. Among all existing clustering techniques, k-means is a very popular method because of its ease of pr...
Fernando De la Torre, Takeo Kanade
COMPLEX
2009
Springer
14 years 2 months ago
Comparing Networks from a Data Analysis Perspective
To probe network characteristics, two predominant ways of network comparison are global property statistics and subgraph enumeration. However, they suffer from limited information...
Wei Li, Jing-Yu Yang
CC
2008
Springer
130views System Software» more  CC 2008»
13 years 9 months ago
IDE Dataflow Analysis in the Presence of Large Object-Oriented Libraries
Abstract. A key scalability challenge for interprocedural dataflow analysis comes from large libraries. Our work addresses this challenge for the general category of interprocedura...
Atanas Rountev, Mariana Sharp, Guoqing Xu