Sciweavers

495 search results - page 70 / 99
» Modeling the Vulnerability Discovery Process
Sort
View
IPPS
2008
IEEE
14 years 4 months ago
Parallel mining of closed quasi-cliques
Graph structure can model the relationships among a set of objects. Mining quasi-clique patterns from large dense graph data makes sense with respect to both statistic and applica...
Yuzhou Zhang, Jianyong Wang, Zhiping Zeng, Lizhu Z...
EUROPAR
2007
Springer
14 years 3 months ago
On the Connectivity of Bluetooth-Based Ad Hoc Networks
We study the connectivity properties of a family of random graphs which closely model the Bluetooth’s device discovery process, where each device tries to connect to other device...
Pilu Crescenzi, Carlo Nocentini, Andrea Pietracapr...
SSDBM
2010
IEEE
105views Database» more  SSDBM 2010»
14 years 2 months ago
Organization of Data in Non-convex Spatial Domains
We present a technique for organizing data in spatial databases with non-convex domains based on an automatic characterization using the medial-axis transform (MAT). We define a t...
Eric A. Perlman, Randal C. Burns, Michael M. Kazhd...
CAISE
2006
Springer
14 years 1 months ago
An Interactive, Asymmetric and Extensional Method for Matching Conceptual Hierarchies
Our work deals with schema or ontology matching and is driven by the following statements: (1) Most of works only consider intensional description of schemas; (2) They mostly use s...
Jérôme David, Fabrice Guillet, R&eacu...
NAACL
2003
13 years 11 months ago
Automatic Extraction of Semantic Networks from Text using Leximancer
Leximancer is a software system for performing conceptual analysis of text data in a largely language independent manner. The system is modelled on Content Analysis and provides u...
Andrew E. Smith