Sciweavers

3639 search results - page 714 / 728
» Provenance as Dependency Analysis
Sort
View
SIGECOM
2008
ACM
151views ECommerce» more  SIGECOM 2008»
14 years 9 months ago
Security and insurance management in networks with heterogeneous agents
Computer users express a strong desire to prevent attacks and to reduce the losses from computer and information security breaches. However, security compromises are common and wi...
Jens Grossklags, Nicolas Christin, John Chuang
SIGMETRICS
2008
ACM
121views Hardware» more  SIGMETRICS 2008»
14 years 9 months ago
Disk scrubbing versus intra-disk redundancy for high-reliability raid storage systems
Two schemes proposed to cope with unrecoverable or latent media errors and enhance the reliability of RAID systems are examined. The first scheme is the established, widely used d...
Ilias Iliadis, Robert Haas, Xiao-Yu Hu, Evangelos ...
IPM
2007
137views more  IPM 2007»
14 years 9 months ago
Analyzing imbalance among homogeneous index servers in a web search system
The performance of parallel query processing in a cluster of index servers is crucial for modern web search systems. In such a scenario, the response time basically depends on the...
Claudine Santos Badue, Ricardo A. Baeza-Yates, Ber...
82
Voted
TIP
2008
153views more  TIP 2008»
14 years 9 months ago
Generalized Flooding and Multicue PDE-Based Image Segmentation
Image segmentation remains an important, but hard-to-solve, problem since it appears to be application dependent with usually no a priori information available regarding the image ...
Anastasia Sofou, Petros Maragos
BMCBI
2005
153views more  BMCBI 2005»
14 years 9 months ago
A comparative review of estimates of the proportion unchanged genes and the false discovery rate
Background: In the analysis of microarray data one generally produces a vector of p-values that for each gene give the likelihood of obtaining equally strong evidence of change by...
Per Broberg