Sciweavers

3330 search results - page 318 / 666
» software 2010
Sort
View
155
Voted
CMS
2006
175views Communications» more  CMS 2006»
15 years 5 months ago
Attack Graph Based Evaluation of Network Security
Abstract. The perspective directions in evaluating network security are simulating possible malefactor's actions, building the representation of these actions as attack graphs...
Igor V. Kotenko, Mikhail Stepashkin
ALIFE
2010
15 years 4 months ago
Living Technology: Exploiting Life's Principles in Technology
The concept of living technology--that is, technology that is based on the powerful core features of life--is explained and illustrated with examples from artificial life software,...
Mark A. Bedau, John S. McCaskill, Norman H. Packar...
BMCBI
2010
88views more  BMCBI 2010»
15 years 4 months ago
MetaBar - a tool for consistent contextual data acquisition and standards compliant submission
Background: Environmental sequence datasets are increasing at an exponential rate; however, the vast majority of them lack appropriate descriptors like sampling location, time and...
Wolfgang Hankeln, Pier Luigi Buttigieg, Dennis Fin...
CCR
2010
110views more  CCR 2010»
15 years 4 months ago
Measurement lab: overview and an invitation to the research community
Measurement Lab (M-Lab) is an open, distributed server platform for researchers to deploy active Internet measurement tools. The goal of M-Lab is to advance network research and e...
Constantine Dovrolis, P. Krishna Gummadi, Aleksand...
CSDA
2010
118views more  CSDA 2010»
15 years 4 months ago
Grapham: Graphical models with adaptive random walk Metropolis algorithms
Recently developed adaptive Markov chain Monte Carlo (MCMC) methods have been applied successfully to many problems in Bayesian statistics. Grapham is a new open source implementat...
Matti Vihola