Sciweavers

2294 search results - page 271 / 459
» From Path Graphs to Directed Path Graphs
Sort
View
ICALP
2005
Springer
15 years 9 months ago
New Approaches for Virtual Private Network Design
Virtual Private Network Design is the following NP-hard problem. We are given a communication network, represented as a weighted graph with thresholds on the nodes which represent...
Friedrich Eisenbrand, Fabrizio Grandoni, Gianpaolo...
131
Voted
ESSLLI
1999
Springer
15 years 7 months ago
Towards Discontinuous Grammar
This paper presents a grammar formalism in which constituent graphs are unions of a continuous surface tree and a discontinuous deep tree. The formalism has an object-oriented desi...
Matthias T. Kromann
IEICET
2010
123views more  IEICET 2010»
15 years 21 days ago
TOA UWB Positioning with Two Receivers Using Known Indoor Features
Ultra-Wideband is an attractive technology for short range positioning, especially indoors. However, for normal Time of Arrival (ToA) positioning, at least three receivers with unb...
Jan Kietlinski-Zaleski, Takaya Yamazato, Masaaki K...
DBSEC
2008
152views Database» more  DBSEC 2008»
15 years 4 months ago
An Attack Graph-Based Probabilistic Security Metric
To protect critical resources in today’s networked environments, it is desirable to quantify the likelihood of potential multi-step attacks that combine multiple vulnerabilities....
Lingyu Wang, Tania Islam, Tao Long, Anoop Singhal,...
IJCAI
2007
15 years 4 months ago
A Factor Graph Model for Software Bug Finding
Automatic tools for finding software errors require knowledge of the rules a program must obey, or “specifications,” before they can identify bugs. We present a method that ...
Ted Kremenek, Andrew Y. Ng, Dawson R. Engler