Sciweavers

577 search results - page 86 / 116
» Engineering Sufficiently Secure Computing
Sort
View
SIGMOD
2011
ACM
204views Database» more  SIGMOD 2011»
14 years 10 days ago
Datalog and emerging applications: an interactive tutorial
We are witnessing an exciting revival of interest in recursive Datalog queries in a variety of emerging application domains such as data integration, information extraction, netwo...
Shan Shan Huang, Todd Jeffrey Green, Boon Thau Loo
CCS
2003
ACM
15 years 2 months ago
Enhancing byte-level network intrusion detection signatures with context
Many network intrusion detection systems (NIDS) use byte sequences as signatures to detect malicious activity. While being highly efficient, they tend to suffer from a high false...
Robin Sommer, Vern Paxson
114
Voted
STORAGESS
2006
ACM
15 years 3 months ago
Using free web storage for data backup
Backing up important data is crucial. A variety of causes can lead to data loss, such as disk failures, administration errors, virus infiltration, theft, and physical damage to e...
Avishay Traeger, Nikolai Joukov, Josef Sipek, Erez...
BMCBI
2007
139views more  BMCBI 2007»
14 years 9 months ago
XSTREAM: A practical algorithm for identification and architecture modeling of tandem repeats in protein sequences
Background: Biological sequence repeats arranged in tandem patterns are widespread in DNA and proteins. While many software tools have been designed to detect DNA tandem repeats (...
Aaron M. Newman, James B. Cooper
85
Voted
CAD
2005
Springer
14 years 9 months ago
Lossless compression of predicted floating-point geometry
The size of geometric data sets in scientific and industrial applications is constantly increasing. Storing surface or volume meshes in standard uncompressed formats results in la...
Martin Isenburg, Peter Lindstrom, Jack Snoeyink