Sciweavers

1147 search results - page 89 / 230
» An Object-Oriented Approach for High Availability of Applica...
Sort
View
IDA
2008
Springer
13 years 8 months ago
ExpertDiscovery system application for the hierarchical analysis of eukaryotic transcription regulatory regions based on DNA cod
We developed Relational Data Mining approach which allows to overcome essential limitations of the Data Mining and Knowledge Discovery techniques. In the paper the approach was im...
I. V. Khomicheva, Eugenii E. Vityaev, Elena A. Ana...
ISCC
2005
IEEE
14 years 2 months ago
Improving Survivability through Traffic Engineering in MPLS Networks
The volume of higher priority Internet applications is increasing as the Internet continues to evolve. Customers require Quality of Service (QoS) guarantees with not only guarante...
Mina Amin, Kin-Hon Ho, George Pavlou, Michael P. H...
FGCS
2010
101views more  FGCS 2010»
13 years 7 months ago
Special section: Switched lightpaths
searchers are now invited to submit abstracts on one or more of the following topics: • Control plane mechanisms, e.g. circuit reservation • Network protocols research, e.g. DC...
P. E. L. Clarke, C. Greenwood, A. C. Davenhall
CASES
2007
ACM
14 years 28 days ago
A fast and generic hybrid simulation approach using C virtual machine
Instruction Set Simulators (ISSes) are important tools for cross-platform software development. The simulation speed is a major concern and many approaches have been proposed to i...
Lei Gao, Stefan Kraemer, Rainer Leupers, Gerd Asch...
ACSAC
2006
IEEE
14 years 3 months ago
Towards Database Firewall: Mining the Damage Spreading Patterns
Access control and integrity constraints are well known approaches to ensure data integrity in commercial database systems. However, due to operational mistakes, malicious intent ...
Kun Bai, Peng Liu