Sciweavers

2169 search results - page 361 / 434
» Using Risk Analysis to Evaluate Design Alternatives
Sort
View
WWW
2006
ACM
16 years 5 months ago
Automatic geotagging of Russian web sites
The poster describes a fast, simple, yet accurate method to associate large amounts of web resources stored in a search engine database with geographic locations. The method uses ...
Alexei Pyalling, Michael Maslov, Pavel Braslavski
EUROPAR
2008
Springer
15 years 6 months ago
Auction Protocols for Resource Allocations in Ad-Hoc Grids
Abstract. Different auction-based approaches have been used to allocate resources in Grids, but none of them provide the design choice for a specific economic model while consideri...
Behnaz Pourebrahimi, Koen Bertels
COMAD
2008
15 years 6 months ago
REBMEC: Repeat Based Maximum Entropy Classifier for Biological Sequences
An important problem in biological data analysis is to predict the family of a newly discovered sequence like a protein or DNA sequence, using the collection of available sequence...
Pratibha Rani, Vikram Pudi
ISCAPDCS
2004
15 years 5 months ago
Detecting Grid-Abuse Attacks by Source-based Monitoring
While it provides the unprecedented processing power to solve many large scale computational problems, GRID, if abused, has the potential to easily be used to launch (for instance...
Jianjia Wu, Dan Cheng, Wei Zhao
ACSAC
2010
IEEE
15 years 2 months ago
Kells: a protection framework for portable data
Portable storage devices, such as key-chain USB devices, are ubiquitous. These devices are often used with impunity, with users repeatedly using the same storage device in open co...
Kevin R. B. Butler, Stephen E. McLaughlin, Patrick...