Sciweavers

341 search results - page 61 / 69
» On Stochastic Modeling for Integrated Security and Dependabi...
Sort
View
CORR
2010
Springer
130views Education» more  CORR 2010»
14 years 6 months ago
Ontology-based Queries over Cancer Data
The ever-increasing amount of data in biomedical research, and in cancer research in particular, needs to be managed to support efficient data access, exchange and integration. Exi...
Alejandra González Beltrán, Ben Tagg...
102
Voted
CCGRID
2010
IEEE
14 years 1 months ago
WORKEM: Representing and Emulating Distributed Scientific Workflow Execution State
- Scientific workflows have become an integral part of cyberinfrastructure as their computational complexity and data sizes have grown. However, the complexity of the distributed i...
Lavanya Ramakrishnan, Dennis Gannon, Beth Plale
JTAER
2010
109views more  JTAER 2010»
14 years 8 months ago
A Flexible Architecture for Privacy-Aware Trust Management
In service-oriented systems a constellation of services cooperate, sharing potentially sensitive information and responsibilities. Cooperation is only possible if the different pa...
Klemens Böhm, Sandro Etalle, Jerry den Hartog...
ICOODB
2010
129views Database» more  ICOODB 2010»
14 years 8 months ago
Solving ORM by MAGIC: MApping GeneratIon and Composition
Object-relational mapping (ORM) technologies have been proposed as a solution for the impedance mismatch problem between object-oriented applications and relational databases. Exis...
David Kensche, Christoph Quix, Xiang Li 0002, Sand...
96
Voted
CCS
2010
ACM
14 years 7 months ago
The limits of automatic OS fingerprint generation
Remote operating system fingerprinting relies on implementation differences between OSs to identify the specific variant executing on a remote host. Because these differences can ...
David W. Richardson, Steven D. Gribble, Tadayoshi ...