Sciweavers

5234 search results - page 735 / 1047
» Simulation of Computer Network Attacks
Sort
View
RECOMB
2005
Springer
16 years 5 months ago
The Factor Graph Network Model for Biological Systems
Abstract. We introduce an extended computational framework for studying biological systems. Our approach combines formalization of existing qualitative models that are in wide but ...
Irit Gat-Viks, Amos Tanay, Daniela Raijman, Ron Sh...
ACMSE
2008
ACM
15 years 7 months ago
Gnutella: integrating performance and security in fully decentralized P2P models
Peer-To-Peer (P2P) systems have made an enormous impact on the Internet, directly affecting its performance and security. The litigation against P2P file sharing has led some desi...
Rossana Motta, Wickus Nienaber, Jon Jenkins
PERCOM
2009
ACM
16 years 5 months ago
Proactive and Adaptive Fuzzy Profile Control for Mobile Phones
In this paper we describe a context-sensitive way to change an active mobile phone profile. We present a method to create a proactive and adaptive phone profile control system that...
Miika Valtonen, Antti-Matti Vainio, Jukka Vanhala
124
Voted
AINA
2009
IEEE
15 years 11 months ago
Modeling Web Request and Session Level Arrivals
This paper is focused on modeling Web request and session level arrival processes. We propose a statistically rigorous approach which includes testing for non-stationarity and Gau...
Xuan Wang, Katerina Goseva-Popstojanova
NCA
2009
IEEE
15 years 11 months ago
Sharing Private Information Across Distributed Databases
—In industries such as healthcare, there is a need to electronically share privacy-sensitive data across distinct organizations. We show how this can be done while allowing organ...
Michael Siegenthaler, Ken Birman