Matt Weinstein

Learn More
Evaluation of computing system security requires knowledge of the vulnerabilities present in the system and of potential attacks against the system. Vulnerabilities can be classified based on their location as application vulnerabilities, network vulnerabilities, or host vulnerabilities. This paper describes Ferret-Windows, a new software tool for checking(More)
The process of generating a nite element mesh is accelerated by integrating physical and geometrical constraints into the initial mesh. By beginning with a near-optimal initial mesh, fewer iterations of reenement are needed to obtain mesh convergence. We apply this algorithm to large-scale bioelectric eld problems involving the complex geometries of the(More)
  • 1