Sciweavers

1028 search results - page 154 / 206
» Using Attack Graphs to Design Systems
Sort
View
NOSSDAV
2010
Springer
14 years 1 months ago
Second life: a social network of humans and bots
Second Life (SL) is a virtual world where people interact and socialize through virtual avatars. Avatars behave similarly to their human counterparts in real life and naturally de...
Matteo Varvello, Geoffrey M. Voelker
COCOON
2011
Springer
12 years 8 months ago
Finding Paths with Minimum Shared Edges
Motivated by a security problem in geographic information systems, we study the following graph theoretical problem: given a graph G, two special nodes s and t in G, and a number k...
Masoud T. Omran, Jörg-Rüdiger Sack, Hami...
BMCBI
2010
160views more  BMCBI 2010»
13 years 3 months ago
eHive: An Artificial Intelligence workflow system for genomic analysis
Background: The Ensembl project produces updates to its comparative genomics resources with each of its several releases per year. During each release cycle approximately two week...
Jessica Severin, Kathryn Beal, Albert J. Vilella, ...
VLSID
2002
IEEE
151views VLSI» more  VLSID 2002»
14 years 9 months ago
Mode Selection and Mode-Dependency Modeling for Power-Aware Embedded Systems
Among the many techniques for system-level power management, it is not currently possible to guarantee timing constraints and have a comprehensive system model at the same time. S...
Dexin Li, Pai H. Chou, Nader Bagherzadeh
GECCO
2005
Springer
141views Optimization» more  GECCO 2005»
14 years 2 months ago
RABNET: a real-valued antibody network for data clustering
This paper proposes a novel constructive learning algorithm for a competitive neural network. The proposed algorithm is developed by taking ideas from the immune system and demons...
Helder Knidel, Leandro Nunes de Castro, Fernando J...