Sciweavers

605 search results - page 70 / 121
» Visual Analogy in Problem Solving
Sort
View
VIZSEC
2005
Springer
14 years 1 months ago
Multiple Coordinated Views for Network Attack Graphs
While efficient graph-based representations have been developed for modeling combinations of low-level network attacks, relatively little attention has been paid to effective tech...
Steven Noel, Michael Jacobs, Pramod Kalapa, Sushil...
INTERACT
2007
13 years 9 months ago
Recognising Erroneous and Exploratory Interactions
A better understanding of “human error” is needed to help overcome problems of people assuming they are to blame for their inability to use poorly designed technology. In order...
Jonathan Back, Ann Blandford, Paul Curzon
SIGSOFT
2003
ACM
14 years 8 months ago
A strategy for efficiently verifying requirements
This paper describes a compositional proof strategy for verifying properties of requirements specifications. The proof strategy, which may be applied using either a model checker ...
Ralph D. Jeffords, Constance L. Heitmeyer
FOCS
2007
IEEE
14 years 2 months ago
The Power of Quantum Systems on a Line
: We study the computational strength of quantum particles (each of finite dimensionality) arranged on a line. First, we prove that it is possible to perform universal adiabatic q...
Dorit Aharonov, Daniel Gottesman, Sandy Irani, Jul...
COCO
2010
Springer
135views Algorithms» more  COCO 2010»
13 years 11 months ago
Lower Bounds for Testing Function Isomorphism
—We prove new lower bounds in the area of property testing of boolean functions. Specifically, we study the problem of testing whether a boolean function f is isomorphic to a ...
Eric Blais, Ryan O'Donnell