Sciweavers

3688 search results - page 27 / 738
» Requirements of Phylogenetic Databases
Sort
View
ER
2009
Springer
166views Database» more  ER 2009»
14 years 2 months ago
A Modeling Ontology for Integrating Vulnerabilities into Security Requirements Conceptual Foundations
Abstract. Vulnerabilities are weaknesses in the requirements, design, and implementation, which attackers exploit to compromise the system. This paper proposes a vulnerability-cent...
Golnaz Elahi, Eric S. K. Yu, Nicola Zannone
ICDE
1995
IEEE
180views Database» more  ICDE 1995»
14 years 9 months ago
Building an Integrated Active OODBMS: Requirements, Architecture, and Design Decisions
Active OODBMSs must provide e cient support for event detection, composition, and rule execution. Previous experience, reported here, building active capabilities on top of existi...
Alejandro P. Buchmann, Jürgen Zimmermann, Jos...
EDBT
2012
ACM
246views Database» more  EDBT 2012»
11 years 10 months ago
"Cut me some slack": latency-aware live migration for databases
Cloud-based data management platforms often employ multitenant databases, where service providers achieve economies of scale by consolidating multiple tenants on shared servers. I...
Sean Kenneth Barker, Yun Chi, Hyun Jin Moon, Hakan...
TMC
2012
11 years 10 months ago
SenseLess: A Database-Driven White Spaces Network
The FCC ruling on Nov 4th, 2008 on white spaces has opened up the possibility of wireless network deployments over white spaces, i.e., vacant UHF TV channels. A key requirement fo...
Rohan Murty, Ranveer Chandra, Thomas Moscibroda, P...
RECOMB
2006
Springer
14 years 8 months ago
New Methods for Detecting Lineage-Specific Selection
Abstract. So far, most methods for identifying sequences under selection based on comparative sequence data have either assumed selectional pressures are the same across all branch...
Adam C. Siepel, Katherine S. Pollard, David Haussl...