Sciweavers

163 search results - page 27 / 33
» A Case Study in the Mechanical Verification of Fault Toleran...
Sort
View
IJNSEC
2010
145views more  IJNSEC 2010»
14 years 4 months ago
Formal Specification of Common Criteria Based Access Control Policy Model
One of the major threats that an enterprise Information system networks are facing today is the Insider threat. As part of the Insider Threat study, lack of an effective access co...
Manpreet Singh, Manjeet S. Patterh
106
Voted
OPODIS
2004
14 years 11 months ago
Comparison of Failures and Attacks on Random and Scale-Free Networks
Abstract. It appeared recently that some statistical properties of complex networks like the Internet, the World Wide Web or Peer-to-Peer systems have an important influence on the...
Jean-Loup Guillaume, Matthieu Latapy, Cléme...
97
Voted
PVLDB
2011
14 years 10 days ago
CoHadoop: Flexible Data Placement and Its Exploitation in Hadoop
Hadoop has become an attractive platform for large-scale data analytics. In this paper, we identify a major performance bottleneck of Hadoop: its lack of ability to colocate relat...
Mohamed Y. Eltabakh, Yuanyuan Tian, Fatma Özc...
EDBT
2006
ACM
126views Database» more  EDBT 2006»
14 years 11 months ago
Replication, Load Balancing and Efficient Range Query Processing in DHTs
We consider the conflicting problems of ensuring data-access load balancing and efficiently processing range queries on peer-to-peer data networks maintained over Distributed Hash ...
Theoni Pitoura, Nikos Ntarmos, Peter Triantafillou
98
Voted
AIME
2009
Springer
15 years 1 months ago
Modeling Clinical Guidelines through Petri Nets
Abstract. Clinical guidelines (GLs) play an important role to standardize and organize clinical processes according to evidence-based medicine. Several computer-based GL representa...
Marco Beccuti, Alessio Bottrighi, Giuliana Frances...