Sciweavers

3639 search results - page 93 / 728
» Provenance as Dependency Analysis
Sort
View
ENTCS
2006
145views more  ENTCS 2006»
14 years 10 months ago
A Classification of Time and/or Probability Dependent Security Properties
In multilevel systems it is important to avoid unwanted indirect information flow from higher levels to lower levels, namely the so called covert channels. Initial studnformation ...
Ruggero Lanotte, Andrea Maggiolo-Schettini, Angelo...
TCBB
2008
103views more  TCBB 2008»
14 years 9 months ago
DNA Motif Representation with Nucleotide Dependency
The problem of discovering novel motifs of binding sites is important to the understanding of gene regulatory networks. Motifs are generally represented by matrices (PWM or PSSM) o...
Francis Y. L. Chin, Henry C. M. Leung
TCOM
2008
131views more  TCOM 2008»
14 years 9 months ago
Accurate estimation of the Hurst parameter of long-range dependent traffic using modified Allan and Hadamard variances
Abstract--Internet traffic exhibits self-similarity and longrange dependence (LRD) on various time scales. In this paper, we propose to use the Modified Allan Variance (MAVAR) and ...
Stefano Bregni, Luca Jmoda
ENTCS
2007
126views more  ENTCS 2007»
14 years 9 months ago
Context Dependent Procedures and Computed Types in -eriFun
We present two enhancements of the functional language L which is used in the eriFun system to write programs and formulate statements about them. Context dependent procedures all...
Andreas Schlosser, Christoph Walther, Michael Gond...
VIS
2004
IEEE
146views Visualization» more  VIS 2004»
15 years 11 months ago
Tracking of Vector Field Singularities in Unstructured 3D Time-Dependent Datasets
In this paper, we present an approach for monitoring the positions of vector field singularities in time-dependent datasets. The concept of singularity index is discussed and exte...
Christoph Garth, Xavier Tricoche, Gerik Scheuerman...