Sciweavers

1325 search results - page 199 / 265
» The Incidence Propagation Method
Sort
View
CCS
2003
ACM
14 years 2 months ago
MECA: an extensible, expressive system and language for statically checking security properties
This paper describes a system and annotation language, MECA, for checking security rules. MECA is expressive and designed for checking real systems. It provides a variety of pract...
Junfeng Yang, Ted Kremenek, Yichen Xie, Dawson R. ...
SIGGRAPH
2000
ACM
14 years 1 months ago
Animating explosions
In this paper, we introduce techniques for animating explosions and their effects. The primary effect of an explosion is a disturbance that causes a shock wave to propagate thro...
Gary D. Yngve, James F. O'Brien, Jessica K. Hodgin...
CORR
2008
Springer
98views Education» more  CORR 2008»
13 years 8 months ago
An Information-Theoretical View of Network-Aware Malware Attacks
This work investigates three aspects: (a) a network vulnerability as the non-uniform vulnerable-host distribution, (b) threats, i.e., intelligent malwares that exploit such a vulne...
Zesheng Chen, Chuanyi Ji
BMCBI
2006
140views more  BMCBI 2006»
13 years 8 months ago
MACSIMS : multiple alignment of complete sequences information management system
Background: In the post-genomic era, systems-level studies are being performed that seek to explain complex biological systems by integrating diverse resources from fields such as...
Julie D. Thompson, Arnaud Muller, Andrew M. Waterh...
CONSTRAINTS
2006
105views more  CONSTRAINTS 2006»
13 years 8 months ago
Symmetry Breaking Constraints for Value Symmetries in Constraint Satisfaction
Constraint satisfaction problems (CSPs) sometimes contain both variable symmetries and value symmetries, causing adverse effects on CSP solvers based on tree search. As a remedy, s...
Y. Law, J. Lee