Sciweavers

1726 search results - page 118 / 346
» Traits: Tools and Methodology
Sort
View
DSN
2005
IEEE
15 years 3 months ago
Towards a Theory of Insider Threat Assessment
Insider attacks are a well-known problem acknowledged as a threat as early as 1980s. The threat is attributed to legitimate users who abuse their privileges, and given their famil...
Ramkumar Chinchani, Anusha Iyer, Hung Q. Ngo, Sham...
INFOVIS
2005
IEEE
15 years 3 months ago
Turning the Bucket of Text into a Pipe
Many visual analysis tools operate on a fixed set of data. However, professional information analysts follow issues over a period of time and need to be able to easily add new doc...
Elizabeth G. Hetzler, Vernon L. Crow, Deborah A. P...
ISCAS
2005
IEEE
122views Hardware» more  ISCAS 2005»
15 years 3 months ago
Linear and nonlinear macromodels for power/signal integrity
— In this paper, a systematic methodology for the assessment of Power/Signal Integrity effects in high-speed communication and information systems is presented. The proposed meth...
Stefano Grivet-Talocia, Igor S. Stievano, Ivan A. ...
IPOM
2005
Springer
15 years 3 months ago
On the Sensitivity of Transit ASes to Internal Failures
Abstract. Network robustness is something all providers are striving for without being able to know all the aspects it encompasses. A key aspect of network robustness concerns its ...
Steve Uhlig
RSFDGRC
2005
Springer
134views Data Mining» more  RSFDGRC 2005»
15 years 3 months ago
The Computational Complexity of Inference Using Rough Set Flow Graphs
Pawlak recently introduced rough set flow graphs (RSFGs) as a graphical framework for reasoning from data. Each rule is associated with three coefficients, which have been shown t...
Cory J. Butz, Wen Yan, Boting Yang