Sciweavers

448 search results - page 68 / 90
» Who is in Control
Sort
View
145
Voted
SIGCOMM
2004
ACM
15 years 9 months ago
Sizing router buffers
All Internet routers contain buffers to hold packets during times of congestion. Today, the size of the buffers is determined by the dynamics of TCP’s congestion control algor...
Guido Appenzeller, Isaac Keslassy, Nick McKeown
144
Voted
DBSEC
2004
170views Database» more  DBSEC 2004»
15 years 5 months ago
RBAC/MAC Security Analysis and Design for UML
In software construction, analysis investigates the boundary of a system (scope and requirements), its usage and access, and from a security perspective, who needs access to what ...
Thuong Doan, Steven A. Demurjian, Charles E. Phill...
118
Voted
BMCBI
2007
103views more  BMCBI 2007»
15 years 3 months ago
A comprehensive evaluation of SAM, the SAM R-package and a simple modification to improve its performance
Background: The Significance Analysis of Microarrays (SAM) is a popular method for detecting significantly expressed genes and controlling the false discovery rate (FDR). Recently...
Shunpu Zhang
JOCN
2010
85views more  JOCN 2010»
15 years 2 months ago
The Blame Game: The Effect of Responsibility and Social Stigma on Empathy for Pain
■ This investigation combined behavioral and functional neuroimaging measures to explore whether perception of pain is modulated by the targetʼs stigmatized status and whether ...
Jean Decety, Stephanie Echols, Joshua Correll
136
Voted
RE
2010
Springer
14 years 10 months ago
Risk-based Confidentiality Requirements Specification for Outsourced IT Systems
Today, companies are required to be in control of their IT assets, and to provide proof of this in the form of independent IT audit reports. However, many companies have outsourced...
Ayse Morali, Roel Wieringa