Sciweavers

2234 search results - page 435 / 447
» Protocol Implementation Using Integrated Layer Processing
Sort
View
116
Voted
CODASPY
2012
13 years 7 months ago
Towards end-to-end secure content storage and delivery with public cloud
Recent years have witnessed the trend of leveraging cloudbased services for large scale content storage, processing, and distribution. Security and privacy are among top concerns ...
Huijun Xiong, Xinwen Zhang, Danfeng Yao, Xiaoxin W...
BMCBI
2006
131views more  BMCBI 2006»
14 years 11 months ago
The statistics of identifying differentially expressed genes in Expresso and TM4: a comparison
Background: Analysis of DNA microarray data takes as input spot intensity measurements from scanner software and returns differential expression of genes between two conditions, t...
Allan A. Sioson, Shrinivasrao P. Mane, Pinghua Li,...
IWQOS
2004
Springer
15 years 4 months ago
Yaksha: a self-tuning controller for managing the performance of 3-tiered Web sites
— Managing the performance of multiple-tiered Web sites under high client loads is a critical problem with the advent of dynamic content and database-driven servers on the Intern...
Abhinav Kamra, Vishal Misra, Erich M. Nahum
AAAI
1998
15 years 16 days ago
An Expert System for Alarm System Planning
This paper discusses the design and implementation of ESSPL, an expert system which generates security plans for alarm systems (Figure 1). Security planning is the task of determi...
Akira Tsurushima, Kenji Urushima, Daigo Sakata, Hi...
DEXA
2009
Springer
175views Database» more  DEXA 2009»
15 years 5 months ago
RoK: Roll-Up with the K-Means Clustering Method for Recommending OLAP Queries
Dimension hierarchies represent a substantial part of the data warehouse model. Indeed they allow decision makers to examine data at different levels of detail with On-Line Analyt...
Fadila Bentayeb, Cécile Favre