Sciweavers

18924 search results - page 3417 / 3785
» Conformance of Distributed Systems
Sort
View
COMPSAC
2002
IEEE
15 years 10 months ago
Private Information Retrieval in the Presence of Malicious Failures
In the application domain of online information services such as online census information, health records and real-time stock quotes, there are at least two fundamental challenge...
Erica Y. Yang, Jie Xu, Keith H. Bennett
154
Voted
COOPIS
2002
IEEE
15 years 10 months ago
Object Security Attributes: Enabling Application-Specific Access Control in Middleware
This paper makes two main contributions towards establishing support for application-specific factors in middleware security mechanisms. First, it develops a simple classification...
Konstantin Beznosov
CSB
2002
IEEE
169views Bioinformatics» more  CSB 2002»
15 years 10 months ago
Bayesian Network and Nonparametric Heteroscedastic Regression for Nonlinear Modeling of Genetic Network
We propose a new statistical method for constructing a genetic network from microarray gene expression data by using a Bayesian network. An essential point of Bayesian network con...
Seiya Imoto, SunYong Kim, Takao Goto, Sachiyo Abur...
123
Voted
DSN
2002
IEEE
15 years 10 months ago
A Realistic Look At Failure Detectors
This paper shows that, in an environment where we do not bound the number of faulty processes, the class P of Perfect failure detectors is the weakest (among realistic failure det...
Carole Delporte-Gallet, Hugues Fauconnier, Rachid ...
HPCA
2002
IEEE
15 years 10 months ago
User-Level Communication in Cluster-Based Servers
Clusters of commodity computers are currently being used to provide the scalability required by severalpopular Internet services. In this paper we evaluate an efficient cluster-b...
Enrique V. Carrera, Srinath Rao, Liviu Iftode, Ric...
« Prev « First page 3417 / 3785 Last » Next »