Sciweavers

557 search results - page 104 / 112
» Two experiences designing for effective security
Sort
View
SIGMOD
2009
ACM
139views Database» more  SIGMOD 2009»
16 years 2 months ago
Detecting and resolving unsound workflow views for correct provenance analysis
views abstract groups of tasks in a workflow into high level composite tasks, in order to reuse sub-workflows and facilitate provenance analysis. However, unless a view is careful...
Peng Sun, Ziyang Liu, Susan B. Davidson, Yi Chen
111
Voted
INFOCOM
2009
IEEE
15 years 8 months ago
Network Performance Anomaly Detection and Localization
Abstract—Detecting the occurrence and location of performance anomalies (e.g., high jitter or loss events) is critical to ensuring the effective operation of network infrastructu...
Paul Barford, Nick G. Duffield, Amos Ron, Joel Som...
MOBICOM
2010
ACM
15 years 2 months ago
Bartendr: a practical approach to energy-aware cellular data scheduling
Cellular radios consume more power and suffer reduced data rate when the signal is weak. According to our measurements, the communication energy per bit can be as much as 6x highe...
Aaron Schulman, Vishnu Navda, Ramachandran Ramjee,...
BMCBI
2010
115views more  BMCBI 2010»
15 years 1 months ago
Importance of replication in analyzing time-series gene expression data: Corticosteroid dynamics and circadian patterns in rat l
Background: Microarray technology is a powerful and widely accepted experimental technique in molecular biology that allows studying genome wide transcriptional responses. However...
Tung T. Nguyen, Richard R. Almon, Debra C. DuBois,...
ICCV
1999
IEEE
16 years 3 months ago
Vision in Bad Weather
Current vision systems are designed to perform in clear weather. Needless to say, in any outdoor application, there is no escape from "bad" weather. Ultimately, computer...
Shree K. Nayar, Srinivasa G. Narasimhan