Sciweavers

2863 search results - page 200 / 573
» Constructing minimum-interference networks
Sort
View
163
Voted
DEXA
2009
Springer
172views Database» more  DEXA 2009»
15 years 6 months ago
Utilizing XML Clustering for Efficient XML Data Management on P2P Networks
Peer-to-Peer (P2P) data integration combines the P2P infrastructure with traditional scheme-based data integration techniques. Some of the primary problems in this research area ar...
Panagiotis Antonellis, Christos Makris, Nikos Tsir...
133
Voted
CEC
2005
IEEE
15 years 5 months ago
Graph composition in a graph grammar-based method for automata network evolution
The dynamics of neural and other automata networks are defined to a large extent by their topologies. Artificial evolution constitutes a practical means by which an optimal topolog...
Martin H. Luerssen, David M. W. Powers
132
Voted
CATS
2007
15 years 5 months ago
Some Structural and Geometric Properties of Two-Connected Steiner Networks
We consider the problem of constructing a shortest Euclidean 2-connected Steiner network (SMN) for a set of terminals. This problem has natural applications in the design of survi...
K. Hvam, L. Reinhardt, Pawel Winter, Martin Zachar...
117
Voted
AAAI
2006
15 years 5 months ago
CUI Networks: A Graphical Representation for Conditional Utility Independence
We introduce CUI networks, a compact graphical representation of utility functions over multiple attributes. CUI networks model multiattribute utility functions using the well stu...
Yagil Engel, Michael P. Wellman
150
Voted
CMS
2006
175views Communications» more  CMS 2006»
15 years 5 months ago
Attack Graph Based Evaluation of Network Security
Abstract. The perspective directions in evaluating network security are simulating possible malefactor's actions, building the representation of these actions as attack graphs...
Igor V. Kotenko, Mikhail Stepashkin