Sciweavers

1415 search results - page 255 / 283
» List making in the home
Sort
View
WORM
2004
15 years 1 months ago
Toward understanding distributed blackhole placement
The monitoring of unused Internet address space has been shown to be an effective method for characterizing Internet threats including Internet worms and DDOS attacks. Because the...
Evan Cooke, Michael Bailey, Zhuoqing Morley Mao, D...
TREC
2003
15 years 1 months ago
Searching for geneRIFs: Concept-Based Query Expansion and Bayes Classification
k gene annotations. Our indexing machinery produces per indexed MEDLINE abstract a list of concepts with an accompanying weight, termed a fingerprint. Searching is done by matching...
Rob Jelier, Martijn J. Schuemie, C. Christiaan van...
ECIS
2000
15 years 1 months ago
Community Health Assessments: A Data Warehousing Approach
- The measurement and assessment of health status in communities throughout the world is a massive information technology challenge. The Comprehensive Assessment for Tracking Commu...
Donald J. Berndt, Alan R. Hevner, James Studnicki
LFP
1992
140views more  LFP 1992»
15 years 1 months ago
Global Tagging Optimization by Type Inference
Tag handling accounts for a substantial amount of execution cost in latently typed languages such as Common LISP and Scheme, especially on architectures that provide no special ha...
Fritz Henglein
SOQUA
2007
15 years 29 days ago
Designing multi-layers self-adaptive complex applications
The impossibility of statically determining the behavior of complex systems that interact at runtime with heterogeneous devices and remote entities, may lead to unexpected system ...
Davide Lorenzoli, Davide Tosi, Salvatore Venticinq...