Sciweavers

140 search results - page 5 / 28
» Configuration Theories
Sort
View
ATAL
2003
Springer
13 years 10 months ago
A configurable mobile agent data protection protocol
This paper addresses the problem of protecting the data carried by mobile agents from the possible attacks of malicious execution hosts. Specifically, we consider protection mecha...
Paolo Maggi, Riccardo Sisto
CSCW
2012
ACM
12 years 2 months ago
Social visualization and negotiation: effects of feedback configuration and status
We describe a social visualization system that monitors the vocal arousal levels of the participants in a simulated twoparty employment negotiation. In a 3x2 factorial experiment ...
Michael Nowak, Juho Kim, Nam Wook Kim, Clifford Na...
BMCBI
2005
137views more  BMCBI 2005»
13 years 6 months ago
A configuration space of homologous proteins conserving mutual information and allowing a phylogeny inference based on pair-wise
Background: Popular methods to reconstruct molecular phylogenies are based on multiple sequence alignments, in which addition or removal of data may change the resulting tree topo...
Olivier Bastien, Philippe Ortet, Sylvaine Roy, Eri...
WWW
2007
ACM
14 years 7 months ago
Preference-based selection of highly configurable web services
A key challenge for dynamic Web service selection is that Web services are typically highly configurable and service requesters often have dynamic preferences on service configura...
Steffen Lamparter, Anupriya Ankolekar, Rudi Studer...
ICDE
2007
IEEE
156views Database» more  ICDE 2007»
14 years 8 months ago
Using Control Theory for Load Shedding in Data Stream Management
Database performance can be greatly affected by environmental and internal dynamics such as workloads and system configurations. Existing strategies to maintain performance under ...
Yi-Cheng Tu, Song Liu, Sunil Prabhakar, Bin Yao, W...