Sciweavers

235 search results - page 47 / 47
» Trust management for secure information flows
Sort
View
BMCBI
2006
109views more  BMCBI 2006»
13 years 5 months ago
An integrated system for genetic analysis
Background: Large-scale genetic mapping projects require data management systems that can handle complex phenotypes and detect and correct high-throughput genotyping errors, yet a...
Simon Fiddy, David Cattermole, Dong Xie, Xiao Yuan...
IEEEIAS
2008
IEEE
13 years 12 months ago
A Friend Mechanism for Mobile Ad Hoc Networks
: In the autonomous environment of mobile ad hoc network (MANET) where nodes are free to move around and depend on each other to initiate communication, cooperation among nodes is ...
Shukor Abd Razak, Normalia Samian, Mohd Aizaini Ma...
ICFP
2010
ACM
13 years 5 months ago
A certified framework for compiling and executing garbage-collected languages
We describe the design, implementation, and use of a machinecertified framework for correct compilation and execution of programs in garbage-collected languages. Our framework ext...
Andrew McCreight, Tim Chevalier, Andrew P. Tolmach
CONEXT
2006
ACM
13 years 11 months ago
Synergy: blending heterogeneous measurement elements for effective network monitoring
Network traffic matrices are important for various network planning and management operations. Previous work for estimation of traffic matrices is based on either link load record...
Awais Ahmed Awan, Andrew W. Moore
VIZSEC
2005
Springer
13 years 11 months ago
Multiple Coordinated Views for Network Attack Graphs
While efficient graph-based representations have been developed for modeling combinations of low-level network attacks, relatively little attention has been paid to effective tech...
Steven Noel, Michael Jacobs, Pramod Kalapa, Sushil...