Sciweavers

1648 search results - page 285 / 330
» On the generation of bicliques of a graph
Sort
View
SIGMETRICS
2002
ACM
114views Hardware» more  SIGMETRICS 2002»
13 years 7 months ago
Search and replication in unstructured peer-to-peer networks
Decentralized and unstructured peer-to-peer networks such as Gnutella are attractive for certain applications because they require no centralized directories and no precise contro...
Qin Lv, Pei Cao, Edith Cohen, Kai Li, Scott Shenke...
TCAD
2002
98views more  TCAD 2002»
13 years 7 months ago
An Esterel compiler for large control-dominated systems
Embedded hard real-time software systems often need fine-grained parallelism and precise control of timing, things typical real-time operating systems do not provide. The Esterel l...
Stephen A. Edwards
ER
2010
Springer
104views Database» more  ER 2010»
13 years 6 months ago
Provenance Management in BioSciences
: Data provenance is becoming increasingly important for biosciences with the advent of large-scale collaborative environments such as the iPlant collaborative, where scientists co...
Sudha Ram, Jun Liu
STTT
2010
132views more  STTT 2010»
13 years 6 months ago
Evaluation of Kermeta for solving graph-based problems
Kermeta is a meta-language for specifying the structure and behavior of graphs of interconnected objects called models. In this paper, we show that Kermeta is relatively suitable f...
Naouel Moha, Sagar Sen, Cyril Faucher, Olivier Bar...
VIROLOGY
2010
162views more  VIROLOGY 2010»
13 years 6 months ago
Applied parallel coordinates for logs and network traffic attack analysis
By looking on how computer security issues are handled today, dealing with numerous and unknown events is not easy. Events need to be normalized, abnormal behaviors must be describ...
Sébastien Tricaud, Philippe Saadé