Sciweavers

1676 search results - page 263 / 336
» Formal Development of Self-organising Systems
Sort
View
NDSS
2009
IEEE
15 years 4 months ago
Two-Party Computation Model for Privacy-Preserving Queries over Distributed Databases
Many existing privacy-preserving techniques for querying distributed databases of sensitive information do not scale for large databases due to the use of heavyweight cryptographi...
Sherman S. M. Chow, Jie-Han Lee, Lakshminarayanan ...
SEFM
2007
IEEE
15 years 4 months ago
Model-driven architecture for cancer research
It is a common phenomenon for research projects to collect and analyse valuable data using ad-hoc information systems. These costly-to-build systems are often composed of incompat...
Radu Calinescu, Steve Harris, Jeremy Gibbons, Jim ...
BIBE
2006
IEEE
160views Bioinformatics» more  BIBE 2006»
15 years 3 months ago
Methods for Random Modularization of Biological Networks
— Biological networks are formalized summaries of our knowledge about interactions among biological system components, like genes, proteins, or metabolites. From their global top...
Zachary M. Saul, Vladimir Filkov
PRDC
2006
IEEE
15 years 3 months ago
Detecting and Exploiting Symmetry in Discrete-state Markov Models
Dependable systems are usually designed with multiple instances of components or logical processes, and often possess symmetries that may be exploited in model-based evaluation. T...
W. Douglas Obal II, Michael G. McQuinn, William H....
COMPSAC
2005
IEEE
15 years 3 months ago
Detecting Intrusions Specified in a Software Specification Language
To protect software against malicious activities, organizations are required to monitor security breaches. Intrusion Detection Systems (IDS) are those kinds of monitoring tools th...
Mohammad Feroz Raihan, Mohammad Zulkernine