Sciweavers

1626 search results - page 120 / 326
» Connections in Networks: A Hybrid Approach
Sort
View
CPAIOR
2010
Springer
14 years 8 months ago
Lazy Clause Generation: Combining the Power of SAT and CP (and MIP?) Solving
Finite domain propagation solving, the basis of constraint programming (CP) solvers, allows building very high-level models of problems, and using highly specific inference encapsu...
Peter J. Stuckey
CCS
2006
ACM
15 years 1 months ago
A scalable approach to attack graph generation
Attack graphs are important tools for analyzing security vulnerabilities in enterprise networks. Previous work on attack graphs has not provided an account of the scalability of t...
Xinming Ou, Wayne F. Boyer, Miles A. McQueen
IJCNN
2007
IEEE
15 years 4 months ago
Faults Detection and Isolation Based On Neural Networks Applied to a Levels Control System
Abstract— Each time more grows the necessity of guaranteeing itself security and trustworthiness of the equipment during the execution of the industrials processes. Then, it is v...
Raphaela G. Fernandes, Diego R. Cabral Silva, Luiz...
COMCOM
2002
143views more  COMCOM 2002»
14 years 9 months ago
Security architecture testing using IDS - a case study
Many security approaches are currently used in organisations. In spite of the widespread use of these security techniques, network intrusion remains a problem. This paper discusse...
Theuns Verwoerd, Ray Hunt
INFOCOM
1999
IEEE
15 years 2 months ago
Measurement-Based Band Allocation in Multiband CDMA
Multiband (or multi-carrier) CDMA is a promising approach to increasing the capacity of CDMA networks, while maintaining compatibility with existing systems. This paper investigate...
Lachlan L. H. Andrew