Sciweavers

1318 search results - page 256 / 264
» Measuring network security using dynamic bayesian network
Sort
View
WWW
2004
ACM
14 years 8 months ago
Challenges and practices in deploying web acceleration solutions for distributed enterprise systems
For most Web-based applications, contents are created dynamically based on the current state of a business, such as product prices and inventory, stored in database systems. These...
Divyakant Agrawal, K. Selçuk Candan, Koji H...
ENTCS
2006
180views more  ENTCS 2006»
13 years 7 months ago
Mobile Synchronizing Petri Nets: A Choreographic Approach for Coordination in Ubiquitous Systems
The term Ubiquitous Computing was coined by Mark Weiser almost two decades ago. Despite all the time that has passed since Weiser's vision, ubiquitous computing still has a l...
Fernando Rosa Velardo, Olga Marroquín Alons...
POPL
2012
ACM
12 years 3 months ago
A language for automatically enforcing privacy policies
It is becoming increasingly important for applications to protect sensitive data. With current techniques, the programmer bears the burden of ensuring that the application’s beh...
Jean Yang, Kuat Yessenov, Armando Solar-Lezama
SIGMETRICS
2009
ACM
182views Hardware» more  SIGMETRICS 2009»
14 years 2 months ago
The age of gossip: spatial mean field regime
Disseminating a piece of information, or updates for a piece of information, has been shown to benefit greatly from simple randomized procedures, sometimes referred to as gossipi...
Augustin Chaintreau, Jean-Yves Le Boudec, Nikodin ...
BMCBI
2010
129views more  BMCBI 2010»
13 years 7 months ago
A temporal precedence based clustering method for gene expression microarray data
Background: Time-course microarray experiments can produce useful data which can help in understanding the underlying dynamics of the system. Clustering is an important stage in m...
Ritesh Krishna, Chang-Tsun Li, Vicky Buchanan-Woll...