Modeling and detecting the cascade vulnerability problem using soft constraints. Bistarelli, S., Foley, S. N., & O'Sullivan, B. In Haddad, H., Omicini, A., Wainwright, R. L., & Liebrock, L. M., editors, Proceedings of the 2004 ACM Symposium on Applied Computing (SAC), Nicosia, Cyprus, March 14-17, 2004, pages 383–390, 2004. ACM.
Modeling and detecting the cascade vulnerability problem using soft constraints [link]Paper  doi  bibtex   
@inproceedings{DBLP:conf/sac/BistarelliFO04,
  author       = {Stefano Bistarelli and
                  Simon N. Foley and
                  Barry O'Sullivan},
  editor       = {Hisham Haddad and
                  Andrea Omicini and
                  Roger L. Wainwright and
                  Lorie M. Liebrock},
  title        = {Modeling and detecting the cascade vulnerability problem using soft
                  constraints},
  booktitle    = {Proceedings of the 2004 {ACM} Symposium on Applied Computing (SAC),
                  Nicosia, Cyprus, March 14-17, 2004},
  pages        = {383--390},
  publisher    = {{ACM}},
  year         = {2004},
  url          = {https://doi.org/10.1145/967900.967984},
  doi          = {10.1145/967900.967984},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sac/BistarelliFO04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}

Downloads: 0