Sciweavers

534 search results - page 58 / 107
» Diameter critical graphs
Sort
View
DBSEC
2008
152views Database» more  DBSEC 2008»
15 years 4 days ago
An Attack Graph-Based Probabilistic Security Metric
To protect critical resources in today’s networked environments, it is desirable to quantify the likelihood of potential multi-step attacks that combine multiple vulnerabilities....
Lingyu Wang, Tania Islam, Tao Long, Anoop Singhal,...
84
Voted
ICIP
2007
IEEE
15 years 5 months ago
Graph-Cut Rate Distortion Algorithm for Contourlet-Based Image Compression
The geometric features of images, such as edges, are difficult to represent. When a redundant transform is used for their extraction, the compression challenge is even more dif...
Maria Trocan, Béatrice Pesquet-Popescu, Jam...
EJC
2007
14 years 11 months ago
Perfect packings with complete graphs minus an edge
Let K− r denote the graph obtained from Kr by deleting one edge. We show that for every integer r ≥ 4 there exists an integer n0 = n0(r) such that every graph G whose order n ...
Oliver Cooley, Daniela Kühn, Deryk Osthus
AGTIVE
2007
Springer
15 years 5 months ago
Using Graph Transformation to Support Collaborative Ontology Evolution
In collaborative ontology engineering, contexts are key to manage the complexity of different dependency types between ontological artefacts. Instead of being frustrated by out-of...
Pieter De Leenheer, Tom Mens
ASPDAC
1999
ACM
157views Hardware» more  ASPDAC 1999»
15 years 3 months ago
A Genetic Algorithm based Approach for Multi-Objective Data-Flow Graph Optimization
: This paper presents a genetic algorithm based approach for algebraic optimization of behavioral system specifications. We introduce a chromosomal representation of data-flow gr...
Birger Landwehr