Sciweavers

469 search results - page 81 / 94
» Quantitative Analysis of Web Services Using SRMC
Sort
View
IJMI
2007
140views more  IJMI 2007»
14 years 11 months ago
Securing electronic health records without impeding the flow of information
Objective: We present an integrated set of technologies, known as the Hippocratic Database, that enable healthcare enterprises to comply with privacy and security laws without imp...
Rakesh Agrawal, Christopher M. Johnson
PVLDB
2008
144views more  PVLDB 2008»
14 years 11 months ago
Mining search engine query logs via suggestion sampling
Many search engines and other web applications suggest auto-completions as the user types in a query. The suggestions are generated from hidden underlying databases, such as query...
Ziv Bar-Yossef, Maxim Gurevich
TDSC
2010
191views more  TDSC 2010»
14 years 10 months ago
SigFree: A Signature-Free Buffer Overflow Attack Blocker
—We propose SigFree, an online signature-free out-of-the-box application-layer method for blocking code-injection buffer overflow attack messages targeting at various Internet se...
Xinran Wang, Chi-Chun Pan, Peng Liu, Sencun Zhu
QEST
2009
IEEE
15 years 6 months ago
Recent Extensions to Traviando
—Traviando is a trace analyzer and visualizer for simulation traces of discrete event dynamic systems. In this paper, we briefly outline recent extensions of Traviando towards a...
Peter Kemper
BMCBI
2006
145views more  BMCBI 2006»
14 years 11 months ago
GEM System: automatic prototyping of cell-wide metabolic pathway models from genomes
Background: Successful realization of a "systems biology" approach to analyzing cells is a grand challenge for our understanding of life. However, current modeling appro...
Kazuharu Arakawa, Yohei Yamada, Kosaku Shinoda, Yo...