Sciweavers

2956 search results - page 352 / 592
» Databases and Higher Types
Sort
View
ACSW
2003
15 years 6 months ago
A Secure Pervasive Environment
This paper explores the complications encountered when attempting to create a secure pervasive computing environment. The model introduced in this paper is primarily conceptual. T...
Patrick G. McLean
SEBD
2004
86views Database» more  SEBD 2004»
15 years 6 months ago
Dimension Compatibility for Data Mart Integration
The problem of integrating autonomous data marts arises when, e.g., a large organization (or a federation thereof) needs to combine independently developed data warehouses. It turn...
Luca Cabibbo, Riccardo Torlone
DFN
2009
15 years 6 months ago
Interactive Analysis of NetFlows for Misuse Detection in Large IP Networks
: While more and more applications require higher network bandwidth, there is also a tendency that large portions of this bandwidth are misused for dubious purposes, such as unauth...
Florian Mansmann, Fabian Fischer, Daniel A. Keim, ...
BMCBI
2008
93views more  BMCBI 2008»
15 years 5 months ago
VirulentPred: a SVM based prediction method for virulent proteins in bacterial pathogens
Background: Prediction of bacterial virulent protein sequences has implications for identification and characterization of novel virulence-associated factors, finding novel drug/v...
Aarti Garg, Dinesh Gupta
CORR
2010
Springer
166views Education» more  CORR 2010»
15 years 5 months ago
A CHAID Based Performance Prediction Model in Educational Data Mining
The performance in higher secondary school education in India is a turning point in the academic lives of all students. As this academic performance is influenced by many factors,...
M. Ramaswami, R. Bhaskaran