Sciweavers

716 search results - page 71 / 144
» Semilinear Program Feasibility
Sort
View
IFIP
2007
Springer
15 years 4 months ago
Insider Threat Analysis Using Information-Centric Modeling
Capability acquisition graphs (CAGs) provide a powerful framework for modeling insider threats, network attacks and system vulnerabilities. However, CAG-based security modeling sys...
Duc T. Ha, Shambhu J. Upadhyaya, Hung Q. Ngo, S. P...
NETCOOP
2007
Springer
15 years 3 months ago
A New Necessary Condition for Shortest Path Routing
In shortest path routing, traffic is routed along shortest paths defined by link weights. However, not all path systems are feasible in that they can be realized in this way. This...
Mats Petter Pettersson, Krzysztof Kuchcinski
CSMR
2006
IEEE
15 years 3 months ago
Dynamic Object Process Graphs
A trace is a record of the execution of a computer program, showing the sequence of operations executed. A trace may be obtained through static or dynamic analysis. An object trac...
Jochen Quante, Rainer Koschke
GLOBECOM
2006
IEEE
15 years 3 months ago
Optimization on Hybrid Channel Assignment for Multi-channel Multi-radio Wireless Mesh Networks
The emergence of multi-channel multi-radio wireless mesh networks has given us many new opportunities and challenges. Particularly, the issue on how to appropriately assign channel...
Andy An-Kai Jeng, Rong-Hong Jan
70
Voted
CEC
2005
IEEE
15 years 3 months ago
A simple hybrid evolutionary algorithm for finding Golomb rulers
Abstract- Finding Golomb rulers is an extremely challenging optimization problem (with many practical applications) that has been approached by a variety of search methods in recen...
Iván Dotú, Pascal Van Hentenryck