Sciweavers

365 search results - page 42 / 73
» Determining Internet Users' Values for Private Information
Sort
View
IAW
2003
IEEE
15 years 3 months ago
The Use of Honeynets to Detect Exploited Systems Across Large Enterprise Networks
– Computer Networks connected to the Internet continue to be compromised and exploited by hackers. This is in spite of the fact that many networks run some type of security mecha...
John G. Levine, Richard LaBella, Henry L. Owen, Di...
ICN
2007
Springer
15 years 3 months ago
Active Peer to Peer
—Peer to peer is an important way for files sharing. In existing P2P systems, users need to query and retrieve files, and have to know some knowledge, such as file names, keyword...
Xuelian Lin, Jinpeng Huai, Xudong Liu, Jun Han
WWW
2008
ACM
15 years 10 months ago
The seamless browser: enhancing the speed of web browsing by zooming and preview thumbnails
In this paper, we present a new web browsing system, Seamless Browser, for fast link traversal on a large screen like TV In navigating web, users mainly suffer from cognitive over...
ByungIn Yoo, JongHo Lea, YeunBae Kim
BMCBI
2011
14 years 4 months ago
SNiPlay: a web-based tool for detection, management and analysis of SNPs. Application to grapevine diversity projects
Background: High-throughput re-sequencing, new genotyping technologies and the availability of reference genomes allow the extensive characterization of Single Nucleotide Polymorp...
Alexis Dereeper, Stéphane Nicolas, Loic Le ...
ER
2004
Springer
103views Database» more  ER 2004»
15 years 3 months ago
Querying Heterogeneous Spatial Databases: Combining an Ontology with Similarity Functions
This paper uses a knowledge-based approach to querying heterogeneous spatial databases based on an ontology and conceptual and attribute similarities. The ontology, which may be in...
Mariella Gutiérrez, M. Andrea Rodríg...