Sciweavers

1761 search results - page 260 / 353
» Effective Distribution of Object-Oriented Applications
Sort
View
117
Voted
ICDCS
2005
IEEE
15 years 7 months ago
Detecting Malicious Beacon Nodes for Secure Location Discovery in Wireless Sensor Networks
Sensors’ locations play a critical role in many sensor network applications. A number of techniques have been proposed recently to discover the locations of regular sensors base...
Donggang Liu, Peng Ning, Wenliang Du
CCS
2010
ACM
15 years 2 months ago
Detecting and characterizing social spam campaigns
Online social networks (OSNs) are popular collaboration and communication tools for millions of users and their friends. Unfortunately, in the wrong hands, they are also effective...
Hongyu Gao, Jun Hu, Christo Wilson, Zhichun Li, Ya...
IPPS
2007
IEEE
15 years 8 months ago
An Adaptive Semantic Filter for Blue Gene/L Failure Log Analysis
— Frequent failure occurrences are becoming a serious concern to the community of high-end computing, especially when the applications and the underlying systems rapidly grow in ...
Yinglung Liang, Yanyong Zhang, Hui Xiong, Ramendra...
124
Voted
ATAL
2007
Springer
15 years 8 months ago
Modelling the provenance of data in autonomous systems
Determining the provenance of data, i.e. the process that led to that data, is vital in many disciplines. For example, in science, the process that produced a given result must be...
Simon Miles, Steve Munroe, Michael Luck, Luc Morea...
CSB
2004
IEEE
112views Bioinformatics» more  CSB 2004»
15 years 5 months ago
Reasoning about Molecular Similarity and Properties
Ascertaining the similarity amongst molecules is a fundamental problem in biology and drug discovery. Since similar molecules tend to have similar biological properties, the notio...
Rahul Singh