Sciweavers

12170 search results - page 2425 / 2434
» Ranking Information in Networks
Sort
View
CONCURRENCY
1998
139views more  CONCURRENCY 1998»
13 years 9 months ago
Applications experience in Jade
This paper presents our experience developing applications in Jade, a portable, implicitly parallel programming language designed for exploiting task-level concurrency. Jade progr...
Martin C. Rinard
CN
1999
128views more  CN 1999»
13 years 9 months ago
Intrusion detection systems as evidence
: Although the main aim of IDSs is to detect intrusions to prompt evasive measures, a further aim can be to supply evidence in criminal and civil legal proceedings. However the fea...
Peter Sommer
SCFBM
2008
151views more  SCFBM 2008»
13 years 9 months ago
Wndchrm - an open source utility for biological image analysis
Background: Biological imaging is an emerging field, covering a wide range of applications in biological and clinical research. However, while machinery for automated experimentin...
Lior Shamir, Nikita Orlov, D. Mark Eckley, Tomasz ...
TITB
2008
204views more  TITB 2008»
13 years 9 months ago
A Cryptographic Approach to Securely Share and Query Genomic Sequences
To support large-scale biomedical research projects, organizations need to share person-specific genomic sequences without violating the privacy of their data subjects. In the past...
Murat Kantarcioglu, Wei Jiang, Ying Liu, Bradley M...
AAAI
2010
13 years 8 months ago
A Trust Model for Supply Chain Management
hey generalize these factors to the abstract concepts of ability, integrity, and benevolence. This model does not use probabilistic decision theory. Other SCM trust factors have be...
Yasaman Haghpanah, Marie desJardins
« Prev « First page 2425 / 2434 Last » Next »