Sciweavers

2281 search results - page 340 / 457
» Security Patterns and Secure Systems Design
Sort
View
130
Voted
ICS
2004
Tsinghua U.
15 years 9 months ago
Adaptive incremental checkpointing for massively parallel systems
Given the scale of massively parallel systems, occurrence of faults is no longer an exception but a regular event. Periodic checkpointing is becoming increasingly important in the...
Saurabh Agarwal, Rahul Garg, Meeta Sharma Gupta, J...
BMCBI
2006
109views more  BMCBI 2006»
15 years 3 months ago
An integrated system for genetic analysis
Background: Large-scale genetic mapping projects require data management systems that can handle complex phenotypes and detect and correct high-throughput genotyping errors, yet a...
Simon Fiddy, David Cattermole, Dong Xie, Xiao Yuan...
164
Voted
IWSOS
2007
Springer
15 years 10 months ago
A Self-organizing Control Plane for Failure Management in Transparent Optical Networks
Self-organizing systems are present in many areas of nature and science, and have more recently been increasingly applied to telecommunications. These systems often exhibit common ...
Nina Skorin-Kapov, Nicolas Puech
OOPSLA
2005
Springer
15 years 9 months ago
CodeQuest: querying source code with datalog
We describe CodeQuest, a system for querying source code. It combines two previous proposals, namely the use of logic programming and database system. Experiments (on projects ran...
Elnar Hajiyev, Mathieu Verbaere, Oege de Moor, Kri...
134
Voted
SIGOPSE
2004
ACM
15 years 9 months ago
AP3: cooperative, decentralized anonymous communication
This paper describes a cooperative overlay network that provides anonymous communication services for participating users. The Anonymizing Peer-to-Peer Proxy (AP3) system provides...
Alan Mislove, Gaurav Oberoi, Ansley Post, Charles ...