Sciweavers

8493 search results - page 1535 / 1699
» Implementing a distributed firewall
Sort
View
CLOUDCOM
2010
Springer
15 years 17 days ago
Power of Clouds in Your Pocket: An Efficient Approach for Cloud Mobile Hybrid Application Development
The advancements in computing have resulted in a boom of cheap, ubiquitous, connected mobile devices as well as seemingly unlimited, utility style, pay as you go computing resourc...
Ashwin Manjunatha, Ajith Ranabahu, Amit P. Sheth, ...
162
Voted
BMCBI
2010
160views more  BMCBI 2010»
14 years 11 months ago
eHive: An Artificial Intelligence workflow system for genomic analysis
Background: The Ensembl project produces updates to its comparative genomics resources with each of its several releases per year. During each release cycle approximately two week...
Jessica Severin, Kathryn Beal, Albert J. Vilella, ...
WWW
2011
ACM
14 years 10 months ago
Counting triangles and the curse of the last reducer
The clustering coefficient of a node in a social network is a fundamental measure that quantifies how tightly-knit the community is around the node. Its computation can be reduce...
Siddharth Suri, Sergei Vassilvitskii
JMLR
2010
117views more  JMLR 2010»
14 years 10 months ago
Exploiting the High Predictive Power of Multi-class Subgroups
Subgroup discovery aims at finding subsets of a population whose class distribution is significantly different from the overall distribution. A number of multi-class subgroup disc...
Tarek Abudawood, Peter A. Flach
JUCS
2010
109views more  JUCS 2010»
14 years 10 months ago
Semantics of Query-Driven Communication of Exact Values
: We address the question of how to communicate among distributed processes values such as real numbers, continuous functions and geometrical solids with arbitrary precision, yet e...
Michal Konecný, Amin Farjudian
« Prev « First page 1535 / 1699 Last » Next »