Sciweavers

2304 search results - page 27 / 461
» On the Vulnerability of Large Graphs
Sort
View
CIKM
2007
Springer
15 years 6 months ago
Top-k subgraph matching query in a large graph
Recently, due to its wide applications, subgraph search has attracted a lot of attention from database and data mining community. Sub-graph search is defined as follows: given a ...
Lei Zou, Lei Chen 0002, Yansheng Lu
ARSCOM
2006
202views more  ARSCOM 2006»
14 years 12 months ago
Domination in Planar Graphs with Small Diameter II
MacGillivray and Seyffarth (J. Graph Theory 22 (1996), 213
Michael Dorfling, Wayne Goddard, Michael A. Hennin...
SIAMCOMP
2011
14 years 6 months ago
A Combinatorial Construction of Almost-Ramanujan Graphs Using the Zig-Zag Product
Reingold, Vadhan and Wigderson [21] introduced the graph zig-zag product. This product combines a large graph and a small graph into one graph, such that the resulting graph inher...
Avraham Ben-Aroya, Amnon Ta-Shma
ICSE
2007
IEEE-ACM
15 years 12 months ago
Stakeholder Value Driven Threat Modeling for Off the Shelf Based Systems
er abstract summarizes the Threat Modeling method based on Attacking Path Analysis (T-MAP) which quantifies and prioritizes security threats by calculating the total severity weig...
Yue Chen
DFT
2005
IEEE
72views VLSI» more  DFT 2005»
15 years 5 months ago
Soft Error Modeling and Protection for Sequential Elements
Sequential elements, flip-flops, latches, and memory cells, are the most vulnerable components to soft errors. Since state-of-the-art designs contain millions of bistables, it i...
Hossein Asadi, Mehdi Baradaran Tahoori