Sciweavers

345 search results - page 69 / 69
» When Systems Loose their Identity
Sort
View
SIGMOD
2004
ACM
156views Database» more  SIGMOD 2004»
14 years 5 months ago
Tree Logical Classes for Efficient Evaluation of XQuery
XML is widely praised for its flexibility in allowing repeated and missing sub-elements. However, this flexibility makes it challenging to develop a bulk algebra, which typically ...
Stelios Paparizos, Yuqing Wu, Laks V. S. Lakshmana...
ATAL
2007
Springer
13 years 11 months ago
Effective tag mechanisms for evolving coordination
Tags or observable features shared by a group of similar agents are effectively used in real and artificial societies to signal intentions and can be used to infer unobservable ...
Matthew Matlock, Sandip Sen
BLISS
2009
IEEE
13 years 6 months ago
Autonomous Physical Secret Functions and Clone-Resistant Identification
Self configuring VLSI technology architectures offer a new environment for creating novel security functions. Two such functions for physical security architectures are proposed t...
Wael Adi
BMCBI
2010
100views more  BMCBI 2010»
13 years 5 months ago
MapMi: automated mapping of microRNA loci
Background: A large effort to discover microRNAs (miRNAs) has been under way. Currently miRBase is their primary repository, providing annotations of primary sequences, precursors...
José Afonso Guerra-Assunção, ...
CCS
2007
ACM
13 years 11 months ago
Filtering spam with behavioral blacklisting
Spam filters often use the reputation of an IP address (or IP address range) to classify email senders. This approach worked well when most spam originated from senders with fix...
Anirudh Ramachandran, Nick Feamster, Santosh Vempa...