Sciweavers

8499 search results - page 92 / 1700
» cans 2009
Sort
View
105
Voted
ER
2009
Springer
166views Database» more  ER 2009»
15 years 7 months ago
A Modeling Ontology for Integrating Vulnerabilities into Security Requirements Conceptual Foundations
Abstract. Vulnerabilities are weaknesses in the requirements, design, and implementation, which attackers exploit to compromise the system. This paper proposes a vulnerability-cent...
Golnaz Elahi, Eric S. K. Yu, Nicola Zannone
115
Voted
DAWAK
2009
Springer
15 years 5 months ago
Mining Violations to Relax Relational Database Constraints
Frequent constraint violations on the data stored in a database may suggest that the semantics of the represented reality is changing. In this work we propose a methodology and a t...
Mirjana Mazuran, Elisa Quintarelli, Rosalba Rossat...
ADMA
2009
Springer
121views Data Mining» more  ADMA 2009»
14 years 10 months ago
Quantitative Comparison of Similarity Measure and Entropy for Fuzzy Sets
Comparison and data analysis to the similarity measures and entropy for fuzzy sets are studied. The distance proportional value between the fuzzy set and the corresponding crisp se...
Hongmei Wang, Sanghyuk Lee, Jaehyung Kim
125
Voted
CEC
2009
IEEE
14 years 10 months ago
Analysis of constant creation techniques on the binomial-3 problem with grammatical evolution
This paper studies the difference between Persistent Random Constants (PRC) and Digit Concatenation as methods for generating constants. It has been shown that certain problems hav...
Jonathan Byrne, Michael O'Neill, Erik Hemberg, Ant...
107
Voted
DLT
2009
14 years 10 months ago
On the Complexity of Hmelevskii's Theorem and Satisfiability of Three Unknown Equations
Abstract. We analyze Hmelevskii's theorem, which states that the general solutions of constant-free equations on three unknowns are expressible by a finite collection of formu...
Aleksi Saarela