Sciweavers

495 search results - page 76 / 99
» Signed quorum systems
Sort
View
BMCBI
2006
82views more  BMCBI 2006»
14 years 12 months ago
Prediction of a key role of motifs binding E2F and NR2F in down-regulation of numerous genes during the development of the mouse
Background: We previously demonstrated that gene expression profiles during neuronal differentiation in vitro and hippocampal development in vivo were very similar, due to a conse...
Michal Dabrowski, Stein Aerts, Bozena Kaminska
KDD
2002
ACM
109views Data Mining» more  KDD 2002»
16 years 7 days ago
Mining intrusion detection alarms for actionable knowledge
In response to attacks against enterprise networks, administrators increasingly deploy intrusion detection systems. These systems monitor hosts, networks, and other resources for ...
Klaus Julisch, Marc Dacier
ESOP
2010
Springer
15 years 9 months ago
Faulty Logic: Reasoning about Fault Tolerant Programs
Transient faults are single-shot hardware errors caused by high energy particles from space, manufacturing defects, overheating, and other sources. Such faults can be devastating f...
Matthew L. Meola and David Walker
EUROPAR
2005
Springer
15 years 5 months ago
Developing Java Grid Applications with Ibis
Ibis1 is a programming environment for the development of grid applications in Java. We aim to support a wide range of applications and parallel platforms, so our example programs ...
Kees van Reeuwijk, Rob van Nieuwpoort, Henri E. Ba...
FC
2005
Springer
149views Cryptology» more  FC 2005»
15 years 5 months ago
Ciphire Mail Email Encryption and Authentication
Abstract. Ciphire Mail is cryptographic software that provides email encryption and digital signatures. The Ciphire Mail client resides on the user's computer between the emai...
Lars Eilebrecht