Sciweavers

845 search results - page 167 / 169
» A Grid workflow infrastructure
Sort
View
CASES
2005
ACM
13 years 10 months ago
Anomalous path detection with hardware support
Embedded systems are being deployed as a part of critical infrastructures and are vulnerable to malicious attacks due to internet accessibility. Intrusion detection systems have b...
Tao Zhang, Xiaotong Zhuang, Santosh Pande, Wenke L...
MEDINFO
2007
177views Healthcare» more  MEDINFO 2007»
13 years 10 months ago
The Molecular Medicine Informatics Model (MMIM)
In 2005, a major collaboration in Melbourne Australia successfully completed implementing a major medical informatics infrastructure – this is now being used for discovery resear...
Marienne Hibbert, Peter Gibbs, Terence O'brien, Pe...
EUMAS
2006
13 years 10 months ago
A Customizable Multi-Agent System for Distributed Data Mining
We present a general Multi-Agent System framework for distributed data mining based on a Peer-toPeer model. The framework adopts message-based asynchronous communication and a dyn...
Giancarlo Fortino, Giuseppe Di Fatta

Publication
172views
14 years 10 months ago
The Spatial Patterns Affecting Home to Work Distances of Two-Worker Households
Round-trips between home and work represent, for the majority of people, most of their daily commuting time; also, setting home and work places involves more constraints for two- ...
Surprenant-Legault, J and El-Geneidy A.
ESORICS
2009
Springer
14 years 9 months ago
Cumulative Attestation Kernels for Embedded Systems
1 There are increasing deployments of networked embedded systems and rising threats of malware intrusions on such systems. To mitigate this threat, it is desirable to enable common...
Michael LeMay, Carl A. Gunter