Sciweavers

1541 search results - page 232 / 309
» Tools and Techniques for Model Checking Networked Programs
Sort
View
86
Voted
INFOCOM
2011
IEEE
14 years 4 months ago
The resilience of WDM networks to probabilistic geographical failures
—Telecommunications networks, and in particular optical WDM networks, are vulnerable to large-scale failures of their physical infrastructure, resulting from physical attacks (su...
Pankaj K. Agarwal, Alon Efrat, Shashidhara K. Ganj...
114
Voted
BIOSYSTEMS
2007
115views more  BIOSYSTEMS 2007»
15 years 21 days ago
Evolving fuzzy rules to model gene expression
This paper develops an algorithm that extracts explanatory rules from microarray data, which we treat as time series, using genetic programming (GP) and fuzzy logic. Reverse polis...
Ricardo Linden, Amit Bhaya
113
Voted
DSN
2006
IEEE
15 years 6 months ago
Designing dependable storage solutions for shared application environments
The costs of data loss and unavailability can be large, so businesses use many data protection techniques, such as remote mirroring, snapshots and backups, to guard against failur...
Shravan Gaonkar, Kimberly Keeton, Arif Merchant, W...
97
Voted
VLDB
1994
ACM
127views Database» more  VLDB 1994»
15 years 4 months ago
Semantic Integration in Heterogeneous Databases Using Neural Networks
One important step in integrating heterogeneous databases is matching equivalent attributes: Determining which fields in two databasesrefer to the samedata. The meaning of informa...
Wen-Syan Li, Chris Clifton
112
Voted
JNW
2006
126views more  JNW 2006»
15 years 16 days ago
Gateway Deployment optimization in Cellular Wi-Fi Mesh Networks
With the standardization of IEEE 802.11, there has been an explosive growth of wireless local area networks (WLAN). Recently, this cost effective technology is being developed aggr...
Rajesh Prasad, Hongyi Wu