Sciweavers

261 search results - page 47 / 53
» New Constructions of One- and Two-Stage Pooling Designs
Sort
View
RECOMB
1997
Springer
13 years 11 months ago
On the complexity and approximation of syntenic distance
The paper studies the computational complexity and approximation algorithms for a new evolutionary distance between multi-chromosomal genomes introduced recently by Ferretti, Nade...
Bhaskar DasGupta, Tao Jiang, Sampath Kannan, Ming ...
JISE
2008
77views more  JISE 2008»
13 years 7 months ago
Formalized Entity Extraction Methodology for Changeable Business Requirements
business requirement in the real world cannot be abstracted correctly into an entity-relationship schema. Once core entities are discovered, we can obtain an Entity-Relationship Di...
Namgyu Kim, Sangwon Lee, Songchun Moon
ERCIM
2007
91views more  ERCIM 2007»
13 years 7 months ago
Challenges in a Service-Oriented World
t of view of the service itself. It is an abstracted version of the original service. An operating guideline of a service represents the possible communication behaviours of partne...
Wolfgang Reisig, Karsten Wolf, Jan Bretschneider, ...
RV
2010
Springer
220views Hardware» more  RV 2010»
13 years 5 months ago
Runtime Verification with the RV System
The RV system is the first system to merge the benefits of Runtime Monitoring with Predictive Analysis. The Runtime Monitoring portion of RV is based on the successful Monitoring O...
Patrick O'Neil Meredith, Grigore Rosu
ICDCS
2008
IEEE
14 years 1 months ago
Distributed Divide-and-Conquer Techniques for Effective DDoS Attack Defenses
Distributed Denial-of-Service (DDoS) attacks have emerged as a popular means of causing mass targeted service disruptions, often for extended periods of time. The relative ease an...
Muthusrinivasan Muthuprasanna, Govindarasu Manimar...