Sciweavers

537 search results - page 81 / 108
» Comparative Study of Protocols Used for Establishing VPN
Sort
View
DASFAA
2009
IEEE
195views Database» more  DASFAA 2009»
15 years 4 months ago
The XMLBench Project: Comparison of Fast, Multi-platform XML libraries
The XML technologies have brought a lot of new ideas and abilities in the field of information management systems. Nowadays, XML is used almost everywhere: from small configurati...
Suren Chilingaryan
CP
1998
Springer
15 years 2 months ago
Error-Correcting Source Code
We study how constraint-based static analysis can be applied to the automated and systematic debugging of program errors. Strongly moding and constraint-based mode analysis are tur...
Yasuhiro Ajiro, Kazunori Ueda, Kenta Cho
BMCBI
2008
128views more  BMCBI 2008»
14 years 9 months ago
In silico analysis of expressed sequence tags from Trichostrongylus vitrinus (Nematoda): comparison of the automated ESTExplorer
Background: The analysis of expressed sequence tags (EST) offers a rapid and cost effective approach to elucidate the transcriptome of an organism, but requires several computatio...
Shivashankar H. Nagaraj, Robin B. Gasser, Alasdair...
KCAP
2011
ACM
14 years 21 days ago
On the role of user-generated metadata in audio visual collections
Recently, various crowdsourcing initiatives showed that targeted efforts of user communities result in massive amounts of tags. For example, the Netherlands Institute for Sound a...
Riste Gligorov, Michiel Hildebrand, Jacco van Osse...
CCGRID
2004
IEEE
15 years 1 months ago
Cache replacement policies revisited: the case of P2P traffic
Peer-to-peer (P2P) file-sharing applications generate a large part if not most of today's Internet traffic. The large volume of this traffic (thus the high potential benefits...
Adam Wierzbicki, Nathaniel Leibowitz, Matei Ripean...