Sciweavers

2269 search results - page 353 / 454
» Query Incentive Networks
Sort
View
166
Voted
INFOCOM
2007
IEEE
15 years 8 months ago
TriBiCa: Trie Bitmap Content Analyzer for High-Speed Network Intrusion Detection
Abstract—Deep packet inspection (DPI) is often used in network intrusion detection and prevention systems (NIDPS), where incoming packet payloads are compared against known attac...
N. Sertac Artan, H. Jonathan Chao
ACNS
2006
Springer
109views Cryptology» more  ACNS 2006»
15 years 8 months ago
Misusing Unstructured P2P Systems to Perform DoS Attacks: The Network That Never Forgets
Unstructured P2P systems have gained great popularity in recent years and are currently used by millions of users. One fundamental property of these systems is the lack of structu...
Elias Athanasopoulos, Kostas G. Anagnostakis, Evan...
ANCS
2005
ACM
15 years 8 months ago
Segmented hash: an efficient hash table implementation for high performance networking subsystems
Hash tables provide efficient table implementations, achieving O(1), query, insert and delete operations at low loads. However, at moderate or high loads collisions are quite freq...
Sailesh Kumar, Patrick Crowley
BMCBI
2005
134views more  BMCBI 2005»
15 years 2 months ago
Windows .NET Network Distributed Basic Local Alignment Search Toolkit (W.ND-BLAST)
Background: BLAST is one of the most common and useful tools for Genetic Research. This paper describes a software application we have termed Windows .NET Distributed Basic Local ...
Scot E. Dowd, Joaquin Zaragoza, Javier R. Rodrigue...
126
Voted
JAMIA
2011
98views more  JAMIA 2011»
14 years 5 months ago
Mapping clinical phenotype data elements to standardized metadata repositories and controlled terminologies: the eMERGE Network
Background Systematic study of clinical phenotypes is important for a better understanding of the genetic basis of human diseases and more effective gene-based disease management....
Jyotishman Pathak, Janey Wang, Sudha Kashyap, Meli...