Sciweavers

2476 search results - page 472 / 496
» Faceted Knowledge Representation
Sort
View
VIZSEC
2004
Springer
14 years 29 days ago
Managing attack graph complexity through visual hierarchical aggregation
We describe a framework for managing network attack graph complexity through interactive visualization, which includes hierarchical aggregation of graph elements. Aggregation coll...
Steven Noel, Sushil Jajodia
INFOCOM
2003
IEEE
14 years 27 days ago
Flow Level Simulation of Large IP Networks
— The aim of this paper is to simulate the interaction of a large number of TCP controlled flows and UDP flows sharing many routers/links, from the knowledge of the network par...
François Baccelli, Dohy Hong
PLDI
2003
ACM
14 years 26 days ago
A provably sound TAL for back-end optimization
Typed assembly languages provide a way to generate machinecheckable safety proofs for machine-language programs. But the soundness proofs of most existing typed assembly languages...
Juan Chen, Dinghao Wu, Andrew W. Appel, Hai Fang
ICRA
2002
IEEE
152views Robotics» more  ICRA 2002»
14 years 17 days ago
Mobile Robot Self-Localization in Large-Scale Environments
— This paper presents a new approach for the absolute self-localization of a mobile robot in structured large-scale environments. The requirements with regard to both, the necess...
Axel Lankenau, Thomas Röfer
KDD
2009
ACM
181views Data Mining» more  KDD 2009»
14 years 6 days ago
Intelligent file scoring system for malware detection from the gray list
Currently, the most significant line of defense against malware is anti-virus products which focus on authenticating valid software from a white list, blocking invalid software f...
Yanfang Ye, Tao Li, Qingshan Jiang, Zhixue Han, Li...