Sciweavers

280 search results - page 26 / 56
» Vulnerability Discovery Modeling Using Weibull Distribution
Sort
View
ICDCS
2006
IEEE
14 years 1 months ago
Robust Accounting in Decentralized P2P Storage Systems
A peer-to-peer (P2P) storage system allows a network of peer computers to increase the availability of their data by replicating it on other peers in the network. In such networks...
Ivan Osipkov, Peng Wang, Nicholas Hopper
KES
2006
Springer
13 years 7 months ago
Symbiotic Sensor Networks in Complex Underwater Terrains: A Simulation Framework
Abstract. This paper presents a new multi-agent physics-based simulation framework (DISCOVERY), supporting experiments with self-organizing underwater sensor and actuator networks....
Vadim Gerasimov, Gerry Healy, Mikhail Prokopenko, ...
IHI
2010
197views Healthcare» more  IHI 2010»
13 years 2 months ago
Beyond safe harbor: automatic discovery of health information de-identification policy alternatives
Regulations in various countries permit the reuse of health information without patient authorization provided the data is "de-identified". In the United States, for ins...
Kathleen Benitez, Grigorios Loukides, Bradley Mali...
JCDL
2011
ACM
272views Education» more  JCDL 2011»
12 years 10 months ago
CollabSeer: a search engine for collaboration discovery
Collaborative research has been increasingly popular and important in academic circles. However, there is no open platform available for scholars or scientists to effectively dis...
Hung-Hsuan Chen, Liang Gou, Xiaolong Zhang, Clyde ...
ICDCN
2011
Springer
12 years 11 months ago
Mining Frequent Subgraphs to Extract Communication Patterns in Data-Centres
In this paper, we propose to use graph-mining techniques to understand the communication pattern within a data-centre. We model the communication observed within a data-centre as a...
Maitreya Natu, Vaishali P. Sadaphal, Sangameshwar ...