Sciweavers

1756 search results - page 235 / 352
» Directed scale-free graphs
Sort
View
103
Voted
APN
2004
Springer
15 years 6 months ago
Reachability Set Generation for Petri Nets: Can Brute Force Be Smart?
Generating the reachability set is one of the most commonly required step when analyzing the logical or stochastic behavior of a system modeled with Petri nets. Traditional “expl...
Gianfranco Ciardo
99
Voted
ESORICS
2004
Springer
15 years 6 months ago
Security Property Based Administrative Controls
Abstract. Access control languages which support administrative controls, and thus allow the ordinary permissions of a system to change, have traditionally been constructed with ï¬...
Jon A. Solworth, Robert H. Sloan
90
Voted
ISW
2004
Springer
15 years 6 months ago
Using Greedy Hamiltonian Call Paths to Detect Stack Smashing Attacks
The ICAT statistics over the past few years have shown at least one out of every five CVE and CVE candidate vulnerabilities have been due to buffer overflows. This constitutes a si...
Mark Foster, Joseph N. Wilson, Shigang Chen
95
Voted
PAKDD
2004
ACM
96views Data Mining» more  PAKDD 2004»
15 years 6 months ago
Spectral Energy Minimization for Semi-supervised Learning
The use of unlabeled data to aid classification is important as labeled data is often available in limited quantity. Instead of utilizing training samples directly into semi-super...
Chun Hung Li, Zhi-Li Wu
130
Voted
SPATIALCOGNITION
2004
Springer
15 years 6 months ago
Modelling Models of Robot Navigation Using Formal Spatial Ontology
Abstract. In this paper we apply a formal ontological framework in order to deconstruct two prominent approaches to navigation from cognitive robotics, the Spatial Semantic Hierarc...
John A. Bateman, Scott Farrar