Sciweavers

3709 search results - page 695 / 742
» Supporting experimentation with Side-Views
Sort
View
CCS
2006
ACM
14 years 16 days ago
A scalable approach to attack graph generation
Attack graphs are important tools for analyzing security vulnerabilities in enterprise networks. Previous work on attack graphs has not provided an account of the scalability of t...
Xinming Ou, Wayne F. Boyer, Miles A. McQueen
CIKM
2006
Springer
14 years 16 days ago
Evaluation by comparing result sets in context
Familiar evaluation methodologies for information retrieval (IR) are not well suited to the task of comparing systems in many real settings. These systems and evaluation methods m...
Paul Thomas, David Hawking
CLEF
2006
Springer
14 years 16 days ago
Medical Image Annotation and Retrieval Using Visual Features
In this article, we present the algorithms and results of our participation in the medical image annotation and retrieval tasks of ImageCLEFmed 2006. We exploit both global featur...
Jing Liu, Yang Hu, Mingjing Li, Songde Ma, Wei-Yin...
CP
2006
Springer
14 years 16 days ago
Boosting Open CSPs
In previous work, a new approach called Open CSP (OCSP) was defined as a way of integrate information gathering and problem solving. Instead of collecting all variable values befor...
Santiago Macho González, Carlos Ansó...
ECOOP
2006
Springer
14 years 14 days ago
Augmenting Automatically Generated Unit-Test Suites with Regression Oracle Checking
A test case consists of two parts: a test input to exercise the program under test and a test oracle to check the correctness of the test execution. A test oracle is often in the f...
Tao Xie