Sciweavers

4013 search results - page 228 / 803
» computer 2002
Sort
View
JCS
2002
94views more  JCS 2002»
15 years 4 months ago
Model-Based Analysis of Configuration Vulnerabilities
Vulnerability analysis is concerned with the problem of identifying weaknesses in computer systems that can be exploited to compromise their security. In this paper we describe a ...
C. R. Ramakrishnan, R. C. Sekar
NGC
2002
Springer
15 years 4 months ago
DNA Sequence Design Using Templates
Sequence design is a crucial problem in information-based biotechnology such as DNA-based computation. We introduce a simple strategy named template method that systematically gene...
Masanori Arita, Satoshi Kobayashi
NGC
2002
Springer
15 years 4 months ago
Chance Discovery and Scenario Analysis
Scenario analysis is often used to identify possible chance events. However, no formal, computational theory yet exists for scenario analysis. In this paper, we commence developme...
Peter McBurney, Simon Parsons
ORDER
2002
87views more  ORDER 2002»
15 years 4 months ago
Posets on up to 16 Points
In this article we describe a very efficient method to construct pairwise nonisomorphic posets (equivalently, T0 topologies). We also give the results obtained by a computer progr...
Gunnar Brinkmann, Brendan D. McKay
RAS
2002
115views more  RAS 2002»
15 years 4 months ago
Performance evaluation and optimization of human control strategy
Modeling human control strategy (HCS) is becoming an increasingly popular paradigm in a number of different research areas, ranging from robotics and intelligent vehicle highway s...
Yangsheng Xu, Jingyan Song, Michael C. Nechyba, Ye...