Sciweavers

3172 search results - page 487 / 635
» New developments of the Z-EDM algorithm
Sort
View
INFOCOM
2009
IEEE
15 years 10 months ago
Cross-Layer Survivability in WDM-Based Networks
—In layered networks, a single failure at a lower layer may cause multiple failures in the upper layers. As a result, traditional schemes that protect against single failures may...
Kyunghan Lee, Eytan Modiano
216
Voted
ADC
2009
Springer
175views Database» more  ADC 2009»
15 years 10 months ago
Conditional Purpose Based Access Control Model for Privacy Protection
This paper presents a model for privacy preserving access control which is based on variety of purposes. Conditional purpose is applied along with allowed purpose and prohibited p...
Md. Enamul Kabir, Hua Wang
89
Voted
WABI
2009
Springer
15 years 10 months ago
MADMX: A Novel Strategy for Maximal Dense Motif Extraction
We develop, analyze and experiment with a new tool, called madmx, which extracts frequent motifs, possibly including don’t care characters, from biological sequences. We introduc...
Roberto Grossi, Andrea Pietracaprina, Nadia Pisant...
101
Voted
CIKM
2009
Springer
15 years 10 months ago
Enhancing expertise retrieval using community-aware strategies
Expertise retrieval has received increased interests in recent years, whose task is to suggest people with relevant expertise. Motivated by the observation that communities could ...
Hongbo Deng, Irwin King, Michael R. Lyu
129
Voted
FMCAD
2009
Springer
15 years 10 months ago
Decision diagrams for linear arithmetic
—Boolean manipulation and existential quantification of numeric variables from linear arithmetic (LA) formulas is at the core of many program analysis and software model checkin...
Sagar Chaki, Arie Gurfinkel, Ofer Strichman