Sciweavers

2421 search results - page 348 / 485
» Integrity Assurance Technique Using Determinant Approach
Sort
View
BMCBI
2010
115views more  BMCBI 2010»
15 years 4 months ago
Multiconstrained gene clustering based on generalized projections
Background: Gene clustering for annotating gene functions is one of the fundamental issues in bioinformatics. The best clustering solution is often regularized by multiple constra...
Jia Zeng, Shanfeng Zhu, Alan Wee-Chung Liew, Hong ...
ICDCS
2010
IEEE
15 years 3 months ago
'Ethernet on AIR': Scalable Routing in very Large Ethernet-Based Networks
—Networks based on Ethernet bridging scale poorly as bridges flood the entire network repeatedly, and several schemes have been proposed to mitigate this flooding problem; howe...
Dhananjay Sampath, Suchit Agarwal, J. J. Garcia-Lu...
DSN
2005
IEEE
15 years 10 months ago
Authenticated System Calls
System call monitoring is a technique for detecting and controlling compromised applications by checking at runtime that each system call conforms to a policy that specifies the ...
Mohan Rajagopalan, Matti A. Hiltunen, Trevor Jim, ...
DSVIS
2005
Springer
15 years 10 months ago
Towards Model Checking Stochastic Aspects of the thinkteam User Interface
Abstract. Stochastic model checking is a recent extension of traditional modelchecking techniques for the integrated analysis of both qualitative and quantitative system properties...
Maurice H. ter Beek, Mieke Massink, Diego Latella
EDBT
2009
ACM
117views Database» more  EDBT 2009»
15 years 7 months ago
A methodology for preference-based personalization of contextual data
The widespread use of mobile appliances, with limitations in terms of storage, power, and connectivity capability, requires to minimize the amount of data to be loaded on user’s...
Antonio Miele, Elisa Quintarelli, Letizia Tanca