Sciweavers

3172 search results - page 487 / 635
» New developments of the Z-EDM algorithm
Sort
View
INFOCOM
2009
IEEE
14 years 2 months ago
Cross-Layer Survivability in WDM-Based Networks
—In layered networks, a single failure at a lower layer may cause multiple failures in the upper layers. As a result, traditional schemes that protect against single failures may...
Kyunghan Lee, Eytan Modiano
ADC
2009
Springer
175views Database» more  ADC 2009»
14 years 2 months ago
Conditional Purpose Based Access Control Model for Privacy Protection
This paper presents a model for privacy preserving access control which is based on variety of purposes. Conditional purpose is applied along with allowed purpose and prohibited p...
Md. Enamul Kabir, Hua Wang
WABI
2009
Springer
14 years 2 months ago
MADMX: A Novel Strategy for Maximal Dense Motif Extraction
We develop, analyze and experiment with a new tool, called madmx, which extracts frequent motifs, possibly including don’t care characters, from biological sequences. We introduc...
Roberto Grossi, Andrea Pietracaprina, Nadia Pisant...
CIKM
2009
Springer
14 years 2 months ago
Enhancing expertise retrieval using community-aware strategies
Expertise retrieval has received increased interests in recent years, whose task is to suggest people with relevant expertise. Motivated by the observation that communities could ...
Hongbo Deng, Irwin King, Michael R. Lyu
FMCAD
2009
Springer
14 years 2 months ago
Decision diagrams for linear arithmetic
—Boolean manipulation and existential quantification of numeric variables from linear arithmetic (LA) formulas is at the core of many program analysis and software model checkin...
Sagar Chaki, Arie Gurfinkel, Ofer Strichman