Sciweavers

842 search results - page 168 / 169
» Numerical Analysis on a Quantum Computer
Sort
View
GAMESEC
2010
244views Game Theory» more  GAMESEC 2010»
13 years 4 months ago
The Password Game: Negative Externalities from Weak Password Practices
The combination of username and password is widely used as a human authentication mechanism on the Web. Despite this universal adoption and despite their long tradition, password s...
Sören Preibusch, Joseph Bonneau
ICDE
2009
IEEE
216views Database» more  ICDE 2009»
13 years 4 months ago
Continuous Subgraph Pattern Search over Graph Streams
Search over graph databases has attracted much attention recently due to its usefulness in many fields, such as the analysis of chemical compounds, intrusion detection in network t...
Changliang Wang, Lei Chen 0002
BMCBI
2010
97views more  BMCBI 2010»
13 years 4 months ago
Preprocessing of gene expression data by optimally robust estimators
Background: The preprocessing of gene expression data obtained from several platforms routinely includes the aggregation of multiple raw signal intensities to one expression value...
Matthias Kohl, Hans-Peter Deigner
FUIN
2010
136views more  FUIN 2010»
13 years 4 months ago
Modeling Biology using Generic Reactive Animation
Abstract. Complex biological systems involve incorporated behaviors of numerous processes, mechanisms and objects. However, experimental analysis, by its nature, divides biological...
Yaki Setty, Irun R. Cohen, David Harel
TC
2010
13 years 1 months ago
Model-Driven System Capacity Planning under Workload Burstiness
In this paper, we define and study a new class of capacity planning models called MAP queueing networks. MAP queueing networks provide the first analytical methodology to describe ...
Giuliano Casale, Ningfang Mi, Evgenia Smirni