Sciweavers

4049 search results - page 638 / 810
» Neural Network Trainer through Computer Networks
Sort
View
109
Voted
CCS
2006
ACM
15 years 7 months ago
An effective defense against email spam laundering
Laundering email spam through open-proxies or compromised PCs is a widely-used trick to conceal real spam sources and reduce spamming cost in underground email spam industry. Spam...
Mengjun Xie, Heng Yin, Haining Wang
IHI
2012
266views Healthcare» more  IHI 2012»
13 years 11 months ago
A software tool for large-scale sharing and querying of clinical documents modeled using HL7 version 3 standard
We present a novel software tool called CDN (Collaborative Data Network) for large-scale sharing and querying of clinical documents modeled using HL7 v3 standard (e.g., Clinical D...
Praveen R. Rao, Tivakar Komara Swami, Deepthi S. R...
ICPADS
2006
IEEE
15 years 9 months ago
iDIBS: An Improved Distributed Backup System
iDIBS is a peer-to-peer backup system which optimizes the Distributed Internet Backup System (DIBS). iDIBS offers increased reliability by enhancing the robustness of existing pac...
Faruck Morcos, Thidapat Chantem, Philip Little, Ti...
105
Voted
GD
2009
Springer
15 years 8 months ago
Orthogonal Connector Routing
Abstract. Orthogonal connectors are used in a variety of common network diagrams. Most interactive diagram editors provide orthogonal connectors with some form of automatic connect...
Michael Wybrow, Kim Marriott, Peter J. Stuckey
PPOPP
2009
ACM
16 years 3 months ago
Software transactional distributed shared memory
We have developed a transaction-based approach to distributed shared memory(DSM) that supports object caching and generates path expression prefetches. A path expression specifies...
Alokika Dash, Brian Demsky