Sciweavers

3424 search results - page 429 / 685
» Building Diverse Computer Systems
Sort
View
CMS
2006
175views Communications» more  CMS 2006»
15 years 5 months ago
Attack Graph Based Evaluation of Network Security
Abstract. The perspective directions in evaluating network security are simulating possible malefactor's actions, building the representation of these actions as attack graphs...
Igor V. Kotenko, Mikhail Stepashkin
AAAI
1993
15 years 5 months ago
Generating Quasi-symbolic Representation of Three-Dimensional Flow
Understanding flow in the three-dimensional phase space is challenging both to human experts and to current computer science technology. To break through the barrier, we are build...
Toyoaki Nishida
BIRTHDAY
2010
Springer
15 years 4 months ago
Change Management for Heterogeneous Development Graphs
Abstract. The error-prone process of formal specification and verification of large systems requires an efficient, evolutionary formal development approach. Development graphs have...
Serge Autexier, Dieter Hutter, Till Mossakowski
ACL
2010
15 years 2 months ago
A Hybrid Hierarchical Model for Multi-Document Summarization
Scoring sentences in documents given abstract summaries created by humans is important in extractive multi-document summarization. In this paper, we formulate extractive summariza...
Asli Çelikyilmaz, Dilek Hakkani-Tur
NAACL
2010
15 years 2 months ago
Extracting Glosses to Disambiguate Word Senses
Like most natural language disambiguation tasks, word sense disambiguation (WSD) requires world knowledge for accurate predictions. Several proxies for this knowledge have been in...
Weisi Duan, Alexander Yates