Sciweavers

230 search results - page 43 / 46
» Cryptanalysis of the Quadratic Generator
Sort
View
GECCO
2004
Springer
15 years 10 months ago
A Step Size Preserving Directed Mutation Operator
Using a directed mutation can improve the efficiency of processing many optimization problems. The first mutation operators of this kind proposed by Hildebrand [1], however, suffer...
Stefan Berlik
VIZSEC
2004
Springer
15 years 10 months ago
Managing attack graph complexity through visual hierarchical aggregation
We describe a framework for managing network attack graph complexity through interactive visualization, which includes hierarchical aggregation of graph elements. Aggregation coll...
Steven Noel, Sushil Jajodia
ICCSA
2003
Springer
15 years 10 months ago
Optimization in the Context of Active Control of Sound
A problem of eliminating the unwanted time-harmonic noise on a predetermined region of interest is solved by active means, i.e., by introducing the additional sources of sound, cal...
Josip Loncaric, Semyon Tsynkov
PLDI
1997
ACM
15 years 9 months ago
Componential Set-Based Analysis
Set-based analysis is a constraint-based whole program analysis that is applicable to functional and objectoriented programming languages. Unfortunately, the analysis is useless f...
Cormac Flanagan, Matthias Felleisen
DAC
2007
ACM
15 years 9 months ago
SBPOR: Second-Order Balanced Truncation for Passive Order Reduction of RLC Circuits
RLC circuits have been shown to be better formulated as second-order systems instead of first-order systems. The corresponding model order reduction techniques for secondorder sys...
Boyuan Yan, Sheldon X.-D. Tan, Pu Liu, Bruce McGau...