Sciweavers

6343 search results - page 104 / 1269
» Robust consensus computation
Sort
View
ETRICS
2006
15 years 7 months ago
A Comparison of Market Approaches to Software Vulnerability Disclosure
Abstract. Practical computer (in)security is largely driven by the existence of and knowledge about vulnerabilities, which can be exploited to breach security mechanisms. Although ...
Rainer Böhme
GCB
2006
Springer
119views Biometrics» more  GCB 2006»
15 years 7 months ago
Comparative Analysis of Cyclic Sequences: Viroids and other Small Circular RNAs
: The analysis of small circular sequences requires specialized tools. While the differences between linear and circular sequences can be neglected in the case of long molecules su...
Axel Mosig, Ivo L. Hofacker, Peter F. Stadler
SACMAT
2010
ACM
15 years 4 months ago
On the definition of role mining
There have been many approaches proposed for role mining. However, the problems solved often differ due to a lack of consensus on the formal definition of the role mining problem....
Mario Frank, Joachim M. Buhmann, David A. Basin
137
Voted
ICECCS
2010
IEEE
161views Hardware» more  ICECCS 2010»
15 years 4 months ago
Model Checking Round-Based Distributed Algorithms
—In the field of distributed computing, there are many round-based algorithms to solve fundamental problems, such as leader election and distributed consensus. Due to the nature...
Xin An, Jun Pang
CDC
2009
IEEE
285views Control Systems» more  CDC 2009»
15 years 1 months ago
Adaptive randomized algorithm for finding eigenvector of stochastic matrix with application to PageRank
Abstract-- The problem of finding the eigenvector corresponding to the largest eigenvalue of a stochastic matrix has numerous applications in ranking search results, multi-agent co...
Alexander V. Nazin, Boris T. Polyak