Sciweavers

918 search results - page 169 / 184
» e-Procurement Using Goal Programming
Sort
View
CCS
2006
ACM
14 years 1 months ago
A scalable approach to attack graph generation
Attack graphs are important tools for analyzing security vulnerabilities in enterprise networks. Previous work on attack graphs has not provided an account of the scalability of t...
Xinming Ou, Wayne F. Boyer, Miles A. McQueen
DEBS
2010
ACM
14 years 29 days ago
Workload characterization for operator-based distributed stream processing applications
Operator-based programming languages provide an effective development model for large scale stream processing applications. A stream processing application consists of many runtim...
Xiaolan J. Zhang, Sujay Parekh, Bugra Gedik, Henri...
AAAI
2006
13 years 11 months ago
The Robot Intelligence Kernel
The Robot Intelligence Kernel (RIK) is a portable, reconfigurable suite of perceptual, behavioral, and cognitive capabilities that can be used across many different platforms, env...
David J. Bruemmer, Douglas A. Few, Miles C. Walton...
BMCBI
2005
292views more  BMCBI 2005»
13 years 9 months ago
Atlas - a data warehouse for integrative bioinformatics
Background: We present a biological data warehouse called Atlas that locally stores and integrates biological sequences, molecular interactions, homology information, functional a...
Sohrab P. Shah, Yong Huang, Tao Xu, Macaire M. S. ...
SAC
2009
ACM
14 years 4 months ago
A practical solution for scripting language compilers
Although scripting languages are becoming increasingly popular, even mature scripting language implementations remain interpreted. Several compilers and reimplementations have bee...
Paul Biggar, Edsko de Vries, David Gregg