Sciweavers

2686 search results - page 134 / 538
» Testing metric properties
Sort
View
126
Voted
CMS
2006
175views Communications» more  CMS 2006»
15 years 2 months ago
Attack Graph Based Evaluation of Network Security
Abstract. The perspective directions in evaluating network security are simulating possible malefactor's actions, building the representation of these actions as attack graphs...
Igor V. Kotenko, Mikhail Stepashkin
106
Voted
CORR
2010
Springer
101views Education» more  CORR 2010»
15 years 13 days ago
Universal Loop-Free Super-Stabilization
Abstract. We propose an univesal scheme to design loop-free and superstabilizing protocols for constructing spanning trees optimizing any tree metrics (not only those that are isom...
Lélia Blin, Maria Potop-Butucaru, Stephane ...
87
Voted
JMLR
2010
99views more  JMLR 2010»
14 years 7 months ago
Characterization, Stability and Convergence of Hierarchical Clustering Methods
We study hierarchical clustering schemes under an axiomatic view. We show that within this framework, one can prove a theorem analogous to one of J. Kleinberg (Kleinberg, 2002), i...
Gunnar Carlsson, Facundo Mémoli
97
Voted
COMPSAC
2003
IEEE
15 years 6 months ago
A Security Characterisation Framework for Trustworthy Component Based Software Systems
This paper explores how to characterise security properties of software components, and how to reason about their suitability for a trustworthy compositional contract. Our framewo...
Khaled M. Khan, Jun Han
ICML
2004
IEEE
16 years 1 months ago
Ensemble selection from libraries of models
We present a method for constructing ensembles from libraries of thousands of models. Model libraries are generated using different learning algorithms and parameter settings. For...
Rich Caruana, Alexandru Niculescu-Mizil, Geoff Cre...