Sciweavers

160 search results - page 16 / 32
» Generalized Isolation Level Definitions
Sort
View
SIGCOMM
2009
ACM
14 years 1 months ago
DECOR: DEClaritive network management and OpeRation
Network management operations are complicated, tedious and error-prone, requiring significant human involvement and expert knowledge. In this paper, we first examine the fundame...
Xu Chen, Yun Mao, Zhuoqing Morley Mao, Jacobus E. ...
GECCO
2007
Springer
130views Optimization» more  GECCO 2007»
14 years 1 months ago
Variable discrimination of crossover versus mutation using parameterized modular structure
Recent work has provided functions that can be used to prove a principled distinction between the capabilities of mutation-based and crossover-based algorithms. However, prior fun...
Rob Mills, Richard A. Watson
ACSAC
2003
IEEE
14 years 20 days ago
Efficient Minimum-Cost Network Hardening Via Exploit Dependency Graphs
In-depth analysis of network security vulnerability must consider attacker exploits not just in isolation, but also in combination. The general approach to this problem is to comp...
Steven Noel, Sushil Jajodia, Brian O'Berry, Michae...
CCR
2010
131views more  CCR 2010»
13 years 7 months ago
DECOR: DEClarative network management and OpeRation
Network management operations are complicated, tedious and error-prone, requiring significant human involvement and expert knowledge. In this paper, we first examine the fundament...
Xu Chen, Yun Mao, Zhuoqing Morley Mao, Jacobus E. ...
SEMWEB
2010
Springer
13 years 5 months ago
Toponym Resolution in Social Media
Increasingly user-generated content is being utilised as a source of information, however each individual piece of content tends to contain low levels of information. In addition, ...
Neil Ireson, Fabio Ciravegna