Sciweavers

1503 search results - page 190 / 301
» Detecting Anomalies in Graphs
Sort
View
102
Voted
ACL
2010
14 years 11 months ago
Untangling the Cross-Lingual Link Structure of Wikipedia
Wikipedia articles in different languages are connected by interwiki links that are increasingly being recognized as a valuable source of cross-lingual information. Unfortunately,...
Gerard de Melo, Gerhard Weikum
122
Voted
CCS
2007
ACM
15 years 7 months ago
Toward measuring network security using attack graphs
In measuring the overall security of a network, a crucial issue is to correctly compose the measure of individual components. Incorrect compositions may lead to misleading results...
Lingyu Wang, Anoop Singhal, Sushil Jajodia
88
Voted
ACSAC
2005
IEEE
15 years 6 months ago
Understanding Complex Network Attack Graphs through Clustered Adjacency Matrices
We apply adjacency matrix clustering to network attack graphs for attack correlation, prediction, and hypothesizing. We self-multiply the clustered adjacency matrices to show atta...
Steven Noel, Sushil Jajodia
200
Voted
ISVC
2009
Springer
15 years 5 months ago
A Novel 3D Segmentation of Vertebral Bones from Volumetric CT Images Using Graph Cuts
Bone mineral density (BMD) measurements and fracture analysis of the spine bones are restricted to the Vertebral bodies (VBs). In this paper, we present a novel and fast 3D segment...
Melih S. Aslan, Asem M. Ali, Ham M. Rara, Ben Arno...
104
Voted
DSN
2000
IEEE
15 years 5 months ago
Fault-Secure Scheduling of Arbitrary Task Graphs to Multiprocessor Systems
In this paper, we propose new scheduling algorithms to achieve fault security in multiprocessor systems. We consider scheduling of parallel programs represented by directed acycli...
Koji Hashimoto, Tatsuhiro Tsuchiya, Tohru Kikuno