Search results
-
-
Title
-
EXPLORATORY VISUALIZATION OF GRAPHS BASED ON COMMUNITY STRUCTURE
-
Author
-
Liu, Yujie
-
Date Created
-
2013
-
Subjects--Topical
-
Computer science, Information technology
-
Description
-
Communities, also called clusters or modules, are groups of nodes which probably share common properties and/or play similar roles within a graph. They widely exist in real networks such as biological, social, and information networks. Allowing us...
-
-
Title
-
Interactive Static Analysis for Application Security
-
Author
-
Zhu, Jun
-
Date Created
-
2015
-
Subjects--Topical
-
Computer science
-
Description
-
Software vulnerabilities have become increasingly pervasive and result in severe data and financial loss to organizations and individuals. One leading source of software vulnerabilities is the insecure code written by developers. Although vulnerab...
-
-
Title
-
POLYPHONIC MUSIC INFORMATION RETRIEVAL BASED ON MULTI-LABEL CASCADE CLASSIFICATION SYSTEM
-
Author
-
Jiang, Wenxin
-
Date Created
-
2009
-
Subjects--Topical
-
Computer science, Information science, Interactive multimedia
-
Description
-
Recognition and separation of sounds played by various instruments is very useful in labeling audio files with semantic information. This is a non-trivial task requiring sound analysis, but the results can aid automatic indexing and browsing music...
-
-
Title
-
Privacy and Spectral Analysis of Social Network Randomization
-
Author
-
Ying, Xiaowei
-
Date Created
-
2011
-
Subjects--Topical
-
Computer science
-
Description
-
Social networks are of significant importance in various application domains. Understanding the general properties of real social networks has gained much attention due to the proliferation of networked data. Many applications of networks such as ...
-
-
Title
-
Reasoning about recognizability in security protocols
-
Author
-
Li, Zhiwei
-
Date Created
-
2012
-
Subjects--Topical
-
Computer science
-
Description
-
Although verifying a message has long been recognized as an important concept, which has been used explicitly or implicitly in security protocol analysis, there is no consensus on its exact meaning. Such a lack of formal treatment of the concept m...