Sciweavers

1627 search results - page 211 / 326
» Service Variability Patterns
Sort
View
ICEBE
2009
IEEE
118views Business» more  ICEBE 2009»
15 years 5 days ago
Temporal Exception Prediction for Loops in Resource Constrained Concurrent Workflows
Workflow management systems (WfMS) are widely used for improving business processes and providing better quality of services. However, rapid changes in business environment can ca...
Iok-Fai Leong, Yain-Whar Si
JOC
2010
92views more  JOC 2010»
14 years 9 months ago
Efficient Cache Attacks on AES, and Countermeasures
We describe several software side-channel attacks based on inter-process leakage through the state of the CPU's memory cache. This leakage reveals memory access patterns, whic...
Eran Tromer, Dag Arne Osvik, Adi Shamir
NAR
2011
157views Computer Vision» more  NAR 2011»
14 years 5 months ago
PlantTFDB 2.0: update and improvement of the comprehensive plant transcription factor database
We updated the plant transcription factor (TF) database to version 2.0 (PlantTFDB 2.0, http:// planttfdb.cbi.pku.edu.cn) which contains 53 319 putative TFs predicted from 49 speci...
He Zhang, Jinpu Jin, Liang Tang, Yi Zhao, Xiaochen...
PERVASIVE
2011
Springer
14 years 5 months ago
n-Gram Geo-trace Modeling
As location-sensing smart phones and location-based services gain mainstream popularity, there is increased interest in developing techniques that can detect anomalous activities. ...
Senaka Buthpitiya, Ying Zhang, Anind K. Dey, Marti...
140
Voted
ICB
2009
Springer
184views Biometrics» more  ICB 2009»
15 years 9 months ago
Challenges and Research Directions for Adaptive Biometric Recognition Systems
Biometric authentication using mobile devices is becoming a convenient and important means to secure access to remote services such as telebanking and electronic transactions. Such...
Norman Poh, Rita Wong, Josef Kittler, Fabio Roli