Sciweavers

1487 search results - page 236 / 298
» The Computational Complexity of Link Building
Sort
View
ACSAC
2006
IEEE
15 years 7 months ago
Practical Attack Graph Generation for Network Defense
Attack graphs are a valuable tool to network defenders, illustrating paths an attacker can use to gain access to a targeted network. Defenders can then focus their efforts on patc...
Kyle Ingols, Richard Lippmann, Keith Piwowarski
CONIELECOMP
2006
IEEE
15 years 7 months ago
Integrating Advanced GLSL Shading and XML Agents into a Learning-Oriented 3D Engine
Most of the existing 3D engines are overwhelmingly complex and do not integrate support for virtual characters. We have developed a teaching oriented 3D engine with support for su...
Edgar Velázquez-Armendáriz, Erik Mil...
LAWEB
2006
IEEE
15 years 7 months ago
Modeling and Composing Navigational Concerns in Web Applications. Requirements and Design Issues
Complex applications, in particular Web applications, deal with a myriad of different concerns and some of them affect several others. The result is that these crosscutting concer...
Silvia E. Gordillo, Gustavo Rossi, Ana Moreira, Jo...
LCN
2006
IEEE
15 years 7 months ago
Efficient Packet Processing in User-Level OSes: A Study of UML
Network server consolidation has become popular through recent virtualization technology that builds secure, isolated network systems on shared hardware. One of the virtualization...
Younggyun Koh, Calton Pu, Sapan Bhatia, Charles Co...
SIGIR
2006
ACM
15 years 7 months ago
LDA-based document models for ad-hoc retrieval
Search algorithms incorporating some form of topic model have a long history in information retrieval. For example, cluster-based retrieval has been studied since the 60s and has ...
Xing Wei, W. Bruce Croft