Sciweavers

1336 search results - page 74 / 268
» SMTP Path Analysis
Sort
View
JSW
2007
106views more  JSW 2007»
13 years 9 months ago
Destabilization of Terrorist Networks through Argument Driven Hypothesis Model
— Social network analysis has been used for quite some time to analyze and understand the behavior of nodes in the network. Theses nodes could be individuals or group of persons,...
Dil Muhammad Akbar Hussain
CCS
2007
ACM
14 years 3 months ago
Topological analysis of network attack vulnerability
: To understand overall vulnerability to network attack, one must consider attacker exploits not just in isolation, but also in combination. That is, one must analyze how low-level...
Sushil Jajodia
ICSE
2004
IEEE-ACM
14 years 9 months ago
An Empirical Comparison of Dynamic Impact Analysis Algorithms
Impact analysis -- determining the potential effects of changes on a software system -- plays an important role in software engineering tasks such as maintenance, regression testi...
Alessandro Orso, Taweesup Apiwattanapong, James La...
ISSRE
2003
IEEE
14 years 2 months ago
Incremental Dynamic Impact Analysis for Evolving Software Systems
Impact analysis – determining the potential effects of changes on a software system – plays an important role in helping engineers re-validate modified software. In previous ...
James Law, Gregg Rothermel
ICIP
2005
IEEE
14 years 10 months ago
Efficient video mosaicing based on motion analysis
Presenting more comprehensive information than key frame and any subset of frames, mosaic has attracted a growing attention in recent years as a useful element for a variety of vi...
Tao Mei, Xian-Sheng Hua, He-Qin Zhou, Shipeng Li, ...