Sciweavers

249 search results - page 50 / 50
» Incorporating Security Behaviour into Business Models Using ...
Sort
View
GECCO
2004
Springer
179views Optimization» more  GECCO 2004»
13 years 10 months ago
An Evolutionary Meta Hierarchical Scheduler for the Linux Operating System
Abstract. The need for supporting CSCW applications with heterogeneous and varying user requirements calls for adaptive and reconfigurable schedulers accommodating a mixture of re...
Horst Wedde, Muddassar Farooq, Mario Lischka
BMCBI
2010
145views more  BMCBI 2010»
12 years 12 months ago
Directionality in protein fold prediction
Background: Ever since the ground-breaking work of Anfinsen et al. in which a denatured protein was found to refold to its native state, it has been frequently stated by the prote...
Jonathan J. Ellis, Fabien P. E. Huard, Charlotte M...
ICDCS
2008
IEEE
13 years 11 months ago
Toward Predictive Failure Management for Distributed Stream Processing Systems
Distributed stream processing systems (DSPSs) have many important applications such as sensor data analysis, network security, and business intelligence. Failure management is ess...
Xiaohui Gu, Spiros Papadimitriou, Philip S. Yu, Sh...
MSOM
2010
65views more  MSOM 2010»
12 years 11 months ago
The Optimal Composition of Influenza Vaccines Subject to Random Production Yields
The Vaccine and Related Biologic Products Advisory Committee meets at least once a year to decide the composition of the influenza vaccine in the U.S. Past evidence suggests that ...
Soo-Haeng Cho