Sciweavers

77 search results - page 14 / 16
» AS Path Inference by Exploiting Known AS Paths
Sort
View
93
Voted
OSDI
2004
ACM
15 years 12 months ago
Enhancing Server Availability and Security Through Failure-Oblivious Computing
We present a new technique, failure-oblivious computing, that enables servers to execute through memory errors without memory corruption. Our safe compiler for C inserts checks th...
Martin C. Rinard, Cristian Cadar, Daniel Dumitran,...
105
Voted
PLANX
2007
15 years 1 months ago
XML Transformation Language Based on Monadic Second Order Logic
Although monadic second-order logic (MSO) has been a foundation of XML queries, little work has attempted to take MSO formulae themselves as a programming construct. Indeed, MSO f...
Kazuhiro Inaba, Haruo Hosoya
ISMB
1998
15 years 29 days ago
A Hidden Markov Model for Predicting Transmembrane Helices in Protein Sequences
A novel method to model and predict the location and orientation of alpha helices in membrane- spanning proteins is presented. It is based on a hidden Markov model (HMM) with an a...
Erik L. L. Sonnhammer, Gunnar von Heijne, Anders K...
AAAI
2008
15 years 1 months ago
A Scalable Jointree Algorithm for Diagnosability
Diagnosability is an essential property that determines how accurate any diagnostic reasoning can be on a system given any sequence of observations. An unobservable fault event in...
Anika Schumann, Jinbo Huang
94
Voted
CN
2008
128views more  CN 2008»
14 years 11 months ago
Autonomous security for autonomous systems
The Internet's interdomain routing protocol, BGP, supports a complex network of Autonomous Systems which is vulnerable to a number of potentially crippling attacks. Several p...
Josh Karlin, Stephanie Forrest, Jennifer Rexford