Sciweavers

123 search results - page 9 / 25
» Patterns for Automated Management of Security and Dependabil...
Sort
View
BMCBI
2011
13 years 1 months ago
PheMaDB: A solution for storage, retrieval, and analysis of high throughput phenotype data
Background: OmniLog™ phenotype microarrays (PMs) have the capability to measure and compare the growth responses of biological samples upon exposure to hundreds of growth condit...
Wenling E. Chang, Keri Sarver, Brandon W. Higgs, T...
GI
2003
Springer
13 years 12 months ago
Policy Based Management for Critical Infrastructure Protection
: Our current societies are fully dependent on large complex critical infrastructures (LCCIs). These LCCIs are large scale distributed systems that are highly interdependent, both ...
Gwendal Le Grand, Franck Springinsfeld, Michel Rig...
GIS
2008
ACM
13 years 7 months ago
Towards a scalable model for location privacy
With the growth of wireless and mobile technologies, we are witnessing an increase in location-based services (LBS). Although LBS provide enhanced functionalities, they open up ne...
Nayot Poolsappasit, Indrakshi Ray
SIGOPSE
1998
ACM
13 years 11 months ago
Nested Java processes: OS structure for mobile code
The majority of work on protection in single-language mobile code environments focuses on information security issues and depends on the language environment for solutions to the ...
Patrick Tullmann, Jay Lepreau
SIGOPS
2010
163views more  SIGOPS 2010»
13 years 1 months ago
Automated control of internet services
Finding an efficient configuration for cluster-based multi-tier Internet services is often a difficult task. Moreover, even a good configuration could become obsolete, depending o...
Jean Arnaud