Sciweavers

293 search results - page 49 / 59
» Identifying the Multiple Contexts of a Situation
Sort
View
ICNP
2000
IEEE
15 years 4 months ago
A Scalable Monitoring Approach for Service Level Agreements Validation
In order to detect violations of end-to-end service level agreements (SLA) and to isolate trouble links and nodes based on a unified framework, managers of a service provider net...
Mun Choon Chan, Yow-Jian Lin, Xin Wang
BMCBI
2006
114views more  BMCBI 2006»
14 years 11 months ago
Taxonomic colouring of phylogenetic trees of protein sequences
Background: Phylogenetic analyses of protein families are used to define the evolutionary relationships between homologous proteins. The interpretation of protein-sequence phyloge...
Gareth Palidwor, Emmanuel G. Reynaud, Miguel A. An...
CORR
2007
Springer
89views Education» more  CORR 2007»
14 years 11 months ago
Evaluating Personal Archiving Strategies for Internet-based Information
Internet-based personal digital belongings present different vulnerabilities than locally stored materials. We use responses to a survey of people who have recovered lost websites...
Catherine C. Marshall, Frank McCown, Michael L. Ne...
TON
1998
103views more  TON 1998»
14 years 11 months ago
Using name-based mappings to increase hit rates
—Clusters of identical intermediate servers are often created to improve availability and robustness in many domains. The use of proxy servers for the World Wide Web (WWW) and of...
David Thaler, Chinya V. Ravishankar
PET
2010
Springer
15 years 3 months ago
Making a Nymbler Nymble Using VERBS
In this work, we propose a new platform to enable service providers, such as web site operators, on the Internet to block past abusive users of anonymizing networks (for example, T...
Ryan Henry, Kevin Henry, Ian Goldberg