Sciweavers

623 search results - page 63 / 125
» Declarative Network Verification
Sort
View
INFORMATICALT
2000
118views more  INFORMATICALT 2000»
13 years 8 months ago
Hexagonal Approach and Modeling for the Visual Cortex
In this paper, the hexagonal approach was proposed for modeling the functioning of cerebral cortex, especially, the processes of learning and recognition of visual information. Thi...
Algis Garliauskas, Alvydas Soliunas
ICDE
2012
IEEE
240views Database» more  ICDE 2012»
11 years 11 months ago
Ego-centric Graph Pattern Census
—There is increasing interest in analyzing networks of all types including social, biological, sensor, computer, and transportation networks. Broadly speaking, we may be interest...
Walaa Eldin Moustafa, Amol Deshpande, Lise Getoor
SP
2000
IEEE
14 years 1 months ago
Using Conservation of Flow as a Security Mechanism in Network Protocols
The law of Conservation of Flow, which states that an input must either be absorbed or sent on as an output (possibly with modification), is an attractive tool with which to analy...
John R. Hughes, Tuomas Aura, Matt Bishop
CAMAD
2006
IEEE
13 years 10 months ago
Nessi: a python network simulator for fast protocol development
A new and simple network simulator Nessi is described in this paper. While other simulators focus on minimizing the simulation time, Nessi tries to minimize the development time an...
Jérôme Vernez, Jürgen Ehrensberg...
FLAIRS
2009
13 years 6 months ago
Constraint-based Approach to Discovery of Inter Module Dependencies in Modular Bayesian Networks
This paper introduces an information theoretic approach to verification of modular causal probabilistic models. We assume systems which are gradually extended by adding new functi...
Patrick de Oude, Gregor Pavlin