Sciweavers

826 search results - page 164 / 166
» Designing for families
Sort
View
OPODIS
2010
13 years 4 months ago
Signature-Free Broadcast-Based Intrusion Tolerance: Never Decide a Byzantine Value
: Provide application processes with strong agreement guarantees despite failures is a fundamental problem of fault-tolerant distributed computing. Correct processes have not to be...
Achour Mostéfaoui, Michel Raynal
WINE
2010
Springer
164views Economy» more  WINE 2010»
13 years 4 months ago
Incentives in Online Auctions via Linear Programming
Online auctions in which items are sold in an online fashion with little knowledge about future bids are common in the internet environment. We study here a problem in which an auc...
Niv Buchbinder, Kamal Jain, Mohit Singh
NAR
2011
260views Computer Vision» more  NAR 2011»
12 years 9 months ago
ASD: a comprehensive database of allosteric proteins and modulators
Allostery is the most direct, rapid and efficient way of regulating protein function, ranging from the control of metabolic mechanisms to signaltransduction pathways. However, an ...
Zhimin Huang, Liang Zhu, Yan Cao, Geng Wu, Xinyi L...
JSAC
2007
116views more  JSAC 2007»
13 years 6 months ago
GroCoca: group-based peer-to-peer cooperative caching in mobile environment
— In a mobile cooperative caching environment, we observe the need for cooperating peers to cache useful data items together, so as to improve cache hit from peers. This could be...
Chi-Yin Chow, Hong Va Leong, Alvin T. S. Chan
CCS
2011
ACM
12 years 6 months ago
BitShred: feature hashing malware for scalable triage and semantic analysis
The sheer volume of new malware found each day is growing at an exponential pace. This growth has created a need for automatic malware triage techniques that determine what malwar...
Jiyong Jang, David Brumley, Shobha Venkataraman