Sciweavers

2424 search results - page 373 / 485
» A general algorithm for data dependence analysis
Sort
View
RAID
1999
Springer
15 years 7 months ago
Audit logs: to keep or not to keep?
We approached this line of inquiry by questioning the conventional wisdom that audit logs are too large to be analyzed and must be reduced and filtered before the data can be anal...
Christopher Wee
175
Voted
ICALP
2009
Springer
16 years 3 months ago
Counting Subgraphs via Homomorphisms
We introduce a generic approach for counting subgraphs in a graph. The main idea is to relate counting subgraphs to counting graph homomorphisms. This approach provides new algori...
Omid Amini, Fedor V. Fomin, Saket Saurabh
121
Voted
EUROSYS
2008
ACM
16 years 17 days ago
Application-level isolation and recovery with solitude
When computer systems are compromised by an attack, it is difficult to determine the precise extent of the damage caused by the attack because the state changes made by an attack...
Shvetank Jain, Fareha Shafique, Vladan Djeric, Ash...
116
Voted
SOSP
2005
ACM
16 years 10 days ago
The taser intrusion recovery system
Recovery from intrusions is typically a very time-consuming operation in current systems. At a time when the cost of human resources dominates the cost of computing resources, we ...
Ashvin Goel, Kenneth Po, Kamran Farhadi, Zheng Li,...
134
Voted
BMCBI
2005
118views more  BMCBI 2005»
15 years 3 months ago
Variation in structural location and amino acid conservation of functional sites in protein domain families
Background: The functional sites of a protein present important information for determining its cellular function and are fundamental in drug design. Accordingly, accurate methods...
Birgit Pils, Richard R. Copley, Jörg Schultz