Sciweavers

3052 search results - page 184 / 611
» Weakly Distributive Domains
Sort
View
PAKDD
2007
ACM
181views Data Mining» more  PAKDD 2007»
15 years 10 months ago
Practical Issues on Privacy-Preserving Health Data Mining
Privacy-preserving data mining techniques could encourage health data custodians to provide accurate information for mining by ensuring that the data mining procedures and results ...
Huidong Jin
PRDC
2006
IEEE
15 years 10 months ago
Leader Election in the Timed Finite Average Response Time Model
The finite average response time model is a very weak distributed systems model: it permits runs with unbounded transmission and processing delays and it does not bound the relat...
Christof Fetzer, Martin Süßkraut
SAC
2006
ACM
15 years 10 months ago
A posteriori defensive programming: an annotation toolkit for DoS-resistant component-based architectures
Denial-of-Service (DoS) attacks are a major concern for modern distributed applications. They exploit weakness in the software in order to make it unavailable to well-behaved user...
Valerio Schiavoni, Vivien Quéma
235
Voted
APLAS
2005
ACM
15 years 10 months ago
Race Conditions in Message Sequence Charts
Message Sequence Charts (MSCs) are a graphical language for the description of scenarios in terms of message exchanges between communicating components in a distributed environment...
Chien-An Chen, Sara Kalvala, Jane Sinclair
GECCO
2005
Springer
107views Optimization» more  GECCO 2005»
15 years 10 months ago
Investigating the success of spatial coevolution
We investigate the results of coevolution of spatially distributed populations. In particular, we describe work in which a simple function approximation problem is used to compare...
Nathan Williams, Melanie Mitchell