Sciweavers

1352 search results - page 270 / 271
» Designing Security Requirements Models Through Planning
Sort
View
ICDCS
1995
IEEE
13 years 8 months ago
Specifying Weak Sets
nt formal speci cations of a new abstraction, weak sets, which can be used to alleviate high latencies when retrieving data from a wide-area information system like the World Wide...
Jeannette M. Wing, David C. Steere
FPGA
2008
ACM
136views FPGA» more  FPGA 2008»
13 years 6 months ago
A complexity-effective architecture for accelerating full-system multiprocessor simulations using FPGAs
Functional full-system simulators are powerful and versatile research tools for accelerating architectural exploration and advanced software development. Their main shortcoming is...
Eric S. Chung, Eriko Nurvitadhi, James C. Hoe, Bab...
BMCBI
2008
226views more  BMCBI 2008»
13 years 5 months ago
ProteoLens: a visual analytic tool for multi-scale database-driven biological network data mining
Background: New systems biology studies require researchers to understand how interplay among myriads of biomolecular entities is orchestrated in order to achieve high-level cellu...
Tianxiao Huan, Andrey Y. Sivachenko, Scott H. Harr...
CVIU
2007
193views more  CVIU 2007»
13 years 5 months ago
Interpretation of complex scenes using dynamic tree-structure Bayesian networks
This paper addresses the problem of object detection and recognition in complex scenes, where objects are partially occluded. The approach presented herein is based on the hypothe...
Sinisa Todorovic, Michael C. Nechyba
SIGMETRICS
2008
ACM
140views Hardware» more  SIGMETRICS 2008»
13 years 5 months ago
Scalable VPN routing via relaying
Enterprise customers are increasingly adopting MPLS (Multiprotocol Label Switching) VPN (Virtual Private Network) service that offers direct any-to-any reachability among the cust...
Changhoon Kim, Alexandre Gerber, Carsten Lund, Dan...