Sciweavers

217 search results - page 16 / 44
» Conflict analysis
Sort
View
ICPP
2009
IEEE
13 years 5 months ago
A Parallel Algorithm for Computing Betweenness Centrality
In this paper we present a multi-grained parallel algorithm for computing betweenness centrality, which is extensively used in large-scale network analysis. Our method is based on ...
Guangming Tan, Dengbiao Tu, Ninghui Sun
CORR
2010
Springer
96views Education» more  CORR 2010»
13 years 2 months ago
Quantifying Information Leakage in Finite Order Deterministic Programs
Information flow analysis is a powerful technique for reasoning about the sensitive information exposed by a program during its execution. While past work has proposed information...
Ji Zhu, Mudhakar Srivatsa
JSAT
2010
83views more  JSAT 2010»
13 years 2 months ago
QuBE7.0
In this paper we outline QuBE7's main features, describing first the options of the preprocessors, and then giving some details about how the core search-based solver (i) per...
Enrico Giunchiglia, Paolo Marin, Massimo Narizzano
ISESE
2005
IEEE
14 years 1 months ago
Risk analysis terminology for IT-systems: does it match intuition?
Many risk specific concepts like “threat”, “consequence” and “risk” belong to the daily language. In a risk analysis one cannot be certain that the participants’ int...
Ida Hogganvik, Ketil Stølen
IAT
2007
IEEE
14 years 1 months ago
Analysis of Multi-Actor Policy Contexts Using Perception Graphs
Policy making is a multi-actor process: it involves a variety of actors, each trying to further their own interests. How these actors decide and act largely depends on the way the...
Pieter W. G. Bots