Sciweavers

5604 search results - page 1051 / 1121
» Becoming Increasingly Reliable
Sort
View
SP
2010
IEEE
210views Security Privacy» more  SP 2010»
15 years 1 months ago
Reconciling Belief and Vulnerability in Information Flow
Abstract—Belief and vulnerability have been proposed recently to quantify information flow in security systems. Both concepts stand as alternatives to the traditional approaches...
Sardaouna Hamadou, Vladimiro Sassone, Catuscia Pal...
ICAC
2007
IEEE
15 years 1 months ago
Exploiting Platform Heterogeneity for Power Efficient Data Centers
It has recently become clear that power management is of critical importance in modern enterprise computing environments. The traditional drive for higher performance has influenc...
Ripal Nathuji, Canturk Isci, Eugene Gorbatov
ICAIL
2007
ACM
15 years 1 months ago
Essential deduplication functions for transactional databases in law firms
As massive document repositories and knowledge management systems continue to expand, in proprietary environments as well as on the Web, the need for duplicate detection becomes i...
Jack G. Conrad, Edward L. Raymond
GCB
2009
Springer
154views Biometrics» more  GCB 2009»
15 years 1 months ago
Comparative Identification of Differential Interactions from Trajectories of Dynamic Biological Networks
Abstract: It is often challenging to reconstruct accurately a complete dynamic biological network due to the scarcity of data collected in cost-effective experiments. This paper ad...
Zhengyu Ouyang, Mingzhou Song
ICDCS
2007
IEEE
15 years 1 months ago
Understanding Instant Messaging Traffic Characteristics
Instant messaging (IM) has become increasingly popular due to its quick response time, its ease of use, and possibility of multitasking. It is estimated that there are several mil...
Zhen Xiao, Lei Guo, John M. Tracey
« Prev « First page 1051 / 1121 Last » Next »