Sciweavers

58 search results - page 11 / 12
» Using strongly typed networking to architect for tussle
Sort
View
ECUMN
2007
Springer
13 years 12 months ago
Path Computation for Incoming Interface Multipath Routing
— Currently used IP routing protocols calculate and only use a single path between two nodes of a network, or in the best case, only paths with the same cost (with OSPF2 or IS-IS...
Pascal Mérindol, Jean-Jacques Pansiot, St&e...
KDD
2009
ACM
227views Data Mining» more  KDD 2009»
14 years 6 months ago
User grouping behavior in online forums
Online forums represent one type of social media that is particularly rich for studying human behavior in information seeking and diffusing. The way users join communities is a re...
Xiaolin Shi, Jun Zhu, Rui Cai, Lei Zhang
BMCBI
2005
116views more  BMCBI 2005»
13 years 5 months ago
Dynamic covariation between gene expression and proteome characteristics
Background: Cells react to changing intra- and extracellular signals by dynamically modulating complex biochemical networks. Cellular responses to extracellular signals lead to ch...
Mansour Taghavi Azar Sharabiani, Markku Siermala, ...
TLDI
2009
ACM
155views Formal Methods» more  TLDI 2009»
14 years 2 months ago
Opis: reliable distributed systems in OCaml
The importance of distributed systems is growing as computing devices become ubiquitous and bandwidth becomes plentiful. Concurrency and distribution pose algorithmic and implemen...
Pierre-Évariste Dagand, Dejan Kostic, Vikto...
EDBTW
2010
Springer
14 years 17 days ago
Key escrow schemes with sliding window for privacy-aware anomaly detection system
Requirements for a traffic monitoring system can be very demanding as both privacy and performance aspects have to be taken into account jointly. Moreover, the legislation sets fo...
Esa Hyytiä, Ivan Gojmerac, Simone Teofili, Gi...