Sciweavers

717 search results - page 43 / 144
» The Viewing Graph
Sort
View
DBSEC
2006
131views Database» more  DBSEC 2006»
13 years 11 months ago
Interactive Analysis of Attack Graphs Using Relational Queries
Abstract. Attack graph is important in defending against well-orchestrated network intrusions. However, the current analysis of attack graphs requires an algorithm to be developed ...
Lingyu Wang, Chao Yao, Anoop Singhal, Sushil Jajod...
DILS
2005
Springer
13 years 12 months ago
Assigning Unique Keys to Chemical Compounds for Data Integration: Some Interesting Counter Examples
Integrating data involving chemical structures is simplified when unique identifiers (UIDs) can be associated with chemical structures. For example, these identifiers can be use...
Greeshma Neglur, Robert L. Grossman, Bing Liu
IIWAS
2007
13 years 11 months ago
An Extensible Framework for Database Security Assessment and Visualization
By using database security metrics to evaluate how risky the current database environment is and visually displaying the metric results on graphs, database security visualization ...
Tran Khanh Dang, Thieu Hoa Le, Duy Tin Truong
ANTSW
2010
Springer
13 years 5 months ago
Short and Robust Communication Paths in Dynamic Wireless Networks
Abstract. We consider the problem of finding and maintaining communication paths in wireless mobile ad hoc networks (MANET). We consider this problem as a bi-objective problem when...
Yoann Pigné, Frédéric Guinand
COMBINATORICA
2010
13 years 7 months ago
A randomized embedding algorithm for trees
In this paper, we propose a simple and natural randomized algorithm to embed a tree T in a given graph G. The algorithm can be viewed as a "self-avoiding tree-indexed random ...
Benny Sudakov, Jan Vondrák