Sciweavers

6300 search results - page 896 / 1260
» We have it easy, but do we have it right
Sort
View
ICDCS
2009
IEEE
15 years 8 months ago
Explicit Batching for Distributed Objects
Although distributed object systems, for example RMI and CORBA, enable object-oriented programs to be easily distributed across a network, achieving acceptable performance usually...
Eli Tilevich, William R. Cook, Yang Jiao
IEEEARES
2009
IEEE
15 years 8 months ago
A Mobile Ambients-Based Approach for Network Attack Modelling and Simulation
Abstract—Attack Graphs are an important support for assessment and subsequent improvement of network security. They reveal possible paths an attacker can take to break through se...
Virginia N. L. Franqueira, Pascal van Eck, Roel Wi...
PERCOM
2009
ACM
15 years 8 months ago
Concurrent Event Detection for Asynchronous Consistency Checking of Pervasive Context
—Contexts, the pieces of information that capture the characteristics of computing environments, are often inconsistent in the dynamic and uncertain pervasive computing environme...
Yu Huang 0002, Xiaoxing Ma, Jiannong Cao, XianPing...
121
Voted
SAC
2009
ACM
15 years 8 months ago
A new protein motif extraction framework based on constrained co-clustering
Signal finding (pattern discovery) in biological sequences is a fundamental problem in both computer science and molecular biology. Many approaches have been proposed for extract...
Francesca Cordero, Alessia Visconti, Marco Botta
ESSOS
2009
Springer
15 years 8 months ago
Protection Poker: Structuring Software Security Risk Assessment and Knowledge Transfer
Discovery of security vulnerabilities is on the rise. As a result, software development teams must place a higher priority on preventing the injection of vulnerabilities in softwar...
Laurie Williams, Michael Gegick, Andrew Meneely