Sciweavers

2292 search results - page 272 / 459
» Structure preserving embedding
Sort
View
FC
2005
Springer
87views Cryptology» more  FC 2005»
15 years 10 months ago
Protecting Secret Data from Insider Attacks
We consider defenses against confidentiality and integrity attacks on data following break-ins, or so-called intrusion resistant storage technologies. We investigate the problem o...
David Dagon, Wenke Lee, Richard J. Lipton
GD
2005
Springer
15 years 10 months ago
Drawing Graphs Using Modular Decomposition
Abstract. In this paper we present an algorithm for drawing an undirected graph G which takes advantage of the structure of the modular decomposition tree of G. Specifically, our ...
Charis Papadopoulos, Constantinos Voglis
CSCLP
2004
Springer
15 years 10 months ago
Automatically Exploiting Symmetries in Constraint Programming
We introduce a framework for studying and solving a class of CSP formulations. The framework allows constraints to be expressed as linear and nonlinear equations, then compiles th...
Arathi Ramani, Igor L. Markov
METRICS
2003
IEEE
15 years 10 months ago
An Analogy-Based Approach for Predicting Design Stability of Java Classes
Predicting stability in object-oriented (OO) software, i.e., the ease with which a software item evolves while preserving its design, is a key feature for software maintenance. In...
David Grosser, Houari A. Sahraoui, Petko Valtchev
EUROPAR
2009
Springer
15 years 9 months ago
Capturing and Visualizing Event Flow Graphs of MPI Applications
A high-level understanding of how an application executes and which performance characteristics it exhibits is essential in many areas of high performance computing, such as applic...
Karl Fürlinger, David Skinner