Sciweavers

1266 search results - page 243 / 254
» Detecting Inconsistencies in Distributed Data
Sort
View
CCS
2005
ACM
14 years 1 months ago
Automatic diagnosis and response to memory corruption vulnerabilities
Cyber attacks against networked computers have become relentless in recent years. The most common attack method is to exploit memory corruption vulnerabilities such as buffer ove...
Jun Xu, Peng Ning, Chongkyung Kil, Yan Zhai, Chris...
GRID
2005
Springer
14 years 1 months ago
A credential renewal service for long-running jobs
— Jobs on the Grid require security credentials throughout their run for accessing secure Grid resources, such as GridFTP data repositories. However, delegating long-lived creden...
Daniel Kouril, Jim Basney
HPCC
2005
Springer
14 years 1 months ago
Correction of Building Height Effect Using LIDAR and GPS
Abstract. Correction of building height effects is a critical step in image interpretation from aerial imagery in urban area. In this paper, an efficient scheme to correct building...
Hong-Gyoo Sohn, Kong-Hyun Yun, Gi-Hong Kim, Hyo Su...
CONEXT
2008
ACM
13 years 9 months ago
Troubleshooting chronic conditions in large IP networks
Chronic network conditions are caused by performance impairing events that occur intermittently over an extended period of time. Such conditions can cause repeated performance deg...
Ajay Mahimkar, Jennifer Yates, Yin Zhang, Aman Sha...
BMCBI
2010
105views more  BMCBI 2010»
13 years 7 months ago
GWAMA: software for genome-wide association meta-analysis
Background: Despite the recent success of genome-wide association studies in identifying novel loci contributing effects to complex human traits, such as type 2 diabetes and obesi...
Reedik Mägi, Andrew P. Morris