Sciweavers

162 search results - page 10 / 33
» Predicting defects using network analysis on dependency grap...
Sort
View
74
Voted
ACSAC
2005
IEEE
15 years 5 months ago
Understanding Complex Network Attack Graphs through Clustered Adjacency Matrices
We apply adjacency matrix clustering to network attack graphs for attack correlation, prediction, and hypothesizing. We self-multiply the clustered adjacency matrices to show atta...
Steven Noel, Sushil Jajodia
SCIA
2005
Springer
158views Image Analysis» more  SCIA 2005»
15 years 5 months ago
A Graph Representation of Filter Networks
Abstract. Filter networks, i.e. decomposition of a filter set into a layered structure of sparse subfilters has been proven successful for e.g. efficient convolution using finit...
Björn Svensson, Mats T. Andersson, Hans Knuts...
ICITS
2011
14 years 3 months ago
Homogeneous Faults, Colored Edge Graphs, and Cover Free Families
In this paper, we use the concept of colored edge graphs to model homogeneous faults in networks. We then use this model to study the minimum connectivity (and design) requirements...
Yongge Wang, Yvo Desmedt
98
Voted
BMCBI
2010
147views more  BMCBI 2010»
14 years 11 months ago
Learning biological network using mutual information and conditional independence
Background: Biological networks offer us a new way to investigate the interactions among different components and address the biological system as a whole. In this paper, a revers...
Dong-Chul Kim, Xiaoyu Wang, Chin-Rang Yang, Jean G...
77
Voted
DSN
2008
IEEE
15 years 6 months ago
Automated duplicate detection for bug tracking systems
Bug tracking systems are important tools that guide the maintenance activities of software developers. The utility of these systems is hampered by an excessive number of duplicate...
Nicholas Jalbert, Westley Weimer