Sciweavers

1147 search results - page 152 / 230
» An Object-Oriented Approach for High Availability of Applica...
Sort
View
CCS
2004
ACM
14 years 2 months ago
Attestation-based policy enforcement for remote access
Intranet access has become an essential function for corporate users. At the same time, corporation’s security administrators have little ability to control access to corporate ...
Reiner Sailer, Trent Jaeger, Xiaolan Zhang, Leende...
ICPP
1998
IEEE
14 years 1 months ago
Routing Algorithms for Anycast Messages
Use of anycast service can considerably simplify many communication applications. Two approaches can be used for routing anycast packets. Single-path routing always uses the same ...
Dong Xuan, Weijia Jia, Wei Zhao
WAN
1998
Springer
14 years 1 months ago
The NRW Metacomputing Initiative
In this paper the Northrhine-Westphalian metacomputing initiative is described. We start by discussing various general aspects of metacomputing and explain the reasons for founding...
Uwe Schwiegelshohn, Ramin Yahyapour
INFSOF
2002
147views more  INFSOF 2002»
13 years 8 months ago
On the efficiency of domain-based COTS product selection method
Use of commercial-off-the-shelf (COTS) products is becoming a popular software development method. Current methods of selecting COTS products involve using the intuition of softwa...
Karl R. P. H. Leung, Hareton K. N. Leung
BMCBI
2008
129views more  BMCBI 2008»
13 years 9 months ago
Motif-directed network component analysis for regulatory network inference
Background: Network Component Analysis (NCA) has shown its effectiveness in discovering regulators and inferring transcription factor activities (TFAs) when both microarray data a...
Chen Wang, Jianhua Xuan, Li Chen, Po Zhao, Yue Wan...