Sciweavers

613 search results - page 91 / 123
» An analysis framework for network-code programs
Sort
View
CBMS
2007
IEEE
15 years 4 months ago
A Large Scale Data Mining Approach to Antibiotic Resistance Surveillance
One of the most considerable functions in a hospital's infection control program is the surveillance of antibiotic resistance. Several traditional methods used to measure it ...
Eugenia G. Giannopoulou, Vasileios P. Kemerlis, Mi...
PVLDB
2010
146views more  PVLDB 2010»
14 years 4 months ago
HaLoop: Efficient Iterative Data Processing on Large Clusters
The growing demand for large-scale data mining and data analysis applications has led both industry and academia to design new types of highly scalable data-intensive computing pl...
Yingyi Bu, Bill Howe, Magdalena Balazinska, Michae...
USS
2010
14 years 7 months ago
VEX: Vetting Browser Extensions for Security Vulnerabilities
The browser has become the de facto platform for everyday computation. Among the many potential attacks that target or exploit browsers, vulnerabilities in browser extensions have...
Sruthi Bandhakavi, Samuel T. King, P. Madhusudan, ...
SCP
1998
163views more  SCP 1998»
14 years 9 months ago
Computing with Continuous Change
A central challenge in computer science and knowledge representation is the integration of conceptual frameworks for continuous and discrete change, as exemplified by the theory ...
Vineet Gupta, Radha Jagadeesan, Vijay A. Saraswat
ICSE
2008
IEEE-ACM
15 years 9 months ago
Security protocols, properties, and their monitoring
This paper examines the suitability and use of runtime verification as means for monitoring security protocols and their properties. In particular, we employ the runtime verificat...
Andreas Bauer 0002, Jan Jürjens