Sciweavers

8132 search results - page 1594 / 1627
» Dependability, Abstraction, and Programming
Sort
View
VIZSEC
2007
Springer
15 years 3 months ago
An Interactive Attack Graph Cascade and Reachability Display
Abstract Attack graphs for large enterprise networks improve security by revealing critical paths used by adversaries to capture network assets. Even with simplification, current a...
Leevar Williams, Richard Lippmann, Kyle Ingols
INFOCOM
2006
IEEE
15 years 3 months ago
Mobile Emulab: A Robotic Wireless and Sensor Network Testbed
Abstract— Simulation has been the dominant research methodology in wireless and sensor networking. When mobility is added, real-world experimentation is especially rare. However,...
David Johnson, Tim Stack, Russ Fish, Daniel Montra...
IROS
2006
IEEE
116views Robotics» more  IROS 2006»
15 years 3 months ago
On the Importance of Asymmetries in Grasp Quality Metrics for Tendon Driven Hands
Abstract— Grasp quality measures are important for understanding how to plan for and maintain appropriate and secure grasps for pick and place operations and tool use. Most grasp...
Jiaxin L. Fu, Nancy S. Pollard
CEC
2005
IEEE
15 years 3 months ago
Multiobjective clustering around medoids
Abstract- The large majority of existing clustering algorithms are centered around the notion of a feature, that is, individual data items are represented by their intrinsic proper...
Julia Handl, Joshua D. Knowles
IWPC
2005
IEEE
15 years 3 months ago
Working Session: Textual Views of Source Code to Support Comprehension
Source code can be viewed in many ways, with each view facilitating access to different information contained within the code. In this working session, we will explore the role th...
Anthony Cox, Michael L. Collard
« Prev « First page 1594 / 1627 Last » Next »