2005
DOI: 10.1007/11427995_77
|View full text |Cite
|
Sign up to set email alerts
|

Template Based Semantic Similarity for Security Applications

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
22
0

Year Published

2006
2006
2023
2023

Publication Types

Select...
4
2

Relationship

0
6

Authors

Journals

citations
Cited by 14 publications
(22 citation statements)
references
References 1 publication
0
22
0
Order By: Relevance
“…Table (1) gives all the symbols used in the paper. Following standard notation, we use calligraphic for subgraphs (e.g., Hq, G, H), bold capitals for matrices (e.g., W, A), and an arrow for column vector (e.g., ai).…”
Section: Discussionmentioning
confidence: 99%
See 4 more Smart Citations
“…Table (1) gives all the symbols used in the paper. Following standard notation, we use calligraphic for subgraphs (e.g., Hq, G, H), bold capitals for matrices (e.g., W, A), and an arrow for column vector (e.g., ai).…”
Section: Discussionmentioning
confidence: 99%
“…The former is necessary to estimate our proposed goodness function g(), as shown in equation (1). There are fast algorithms to compute or partially pre-compute the desirable proximity scores ri,j for every pair of nodes (i, j).…”
Section: Preliminaries: Random Walks and Cepsmentioning
confidence: 99%
See 3 more Smart Citations