Sciweavers

627 search results - page 119 / 126
» Efficient On-the-Fly Algorithms for the Analysis of Timed Ga...
Sort
View
CCS
2006
ACM
13 years 10 months ago
Resiliency policies in access control
We introduce the notion of resiliency policies in the context of access control systems. Such policies require an access control system to be resilient to the absence of users. An...
Ninghui Li, Mahesh V. Tripunitara, Qihua Wang
BMCBI
2008
169views more  BMCBI 2008»
13 years 6 months ago
CompMoby: Comparative MobyDick for detection of cis-regulatory motifs
Background: The regulation of gene expression is complex and occurs at many levels, including transcriptional and post-transcriptional, in metazoans. Transcriptional regulation is...
Christina Chaivorapol, Collin Melton, Grace Wei, R...
SIGMOD
2007
ACM
167views Database» more  SIGMOD 2007»
14 years 6 months ago
Data currency in replicated DHTs
Distributed Hash Tables (DHTs) provide a scalable solution for data sharing in P2P systems. To ensure high data availability, DHTs typically rely on data replication, yet without ...
Reza Akbarinia, Esther Pacitti, Patrick Valduriez
ESA
2010
Springer
207views Algorithms» more  ESA 2010»
13 years 7 months ago
Budgeted Red-Blue Median and Its Generalizations
In a Content Distribution Network application, we have a set of servers and a set of clients to be connected to the servers. Often there are a few server types and a hard budget co...
MohammadTaghi Hajiaghayi, Rohit Khandekar, Guy Kor...
CIVR
2008
Springer
165views Image Analysis» more  CIVR 2008»
13 years 8 months ago
Balancing thread based navigation for targeted video search
Various query methods for video search exist. Because of the semantic gap each method has its limitations. We argue that for effective retrieval query methods need to be combined ...
Ork de Rooij, Cees G. M. Snoek, Marcel Worring