Sciweavers

1957 search results - page 369 / 392
» Query Processing in Sensor Networks
Sort
View
74
Voted
DSN
2005
IEEE
15 years 7 months ago
Detecting Stealth Software with Strider GhostBuster
Stealth malware programs that silently infect enterprise and consumer machines are becoming a major threat to the future of the Internet [XZ04]. Resource hiding is a powerful stea...
Yi-Min Wang, Doug Beck, Binh Vo, Roussi Roussev, C...
CIKM
2003
Springer
15 years 7 months ago
Hierarchical graph indexing
Traffic analysis, in the context of Telecommunications or Internet and Web data, is crucial for large network operations. Data in such networks is often provided as large graphs w...
James Abello, Yannis Kotidis
115
Voted
USENIX
2008
15 years 4 months ago
Context-Aware Prefetching at the Storage Server
In many of today's applications, access to storage constitutes the major cost of processing a user request. Data prefetching has been used to alleviate the storage access lat...
Gokul Soundararajan, Madalin Mihailescu, Cristiana...
139
Voted
JSW
2006
124views more  JSW 2006»
15 years 1 months ago
Dynamic Web Service Calls for Data Integration
Web Services are considered as a dominant paradigm for constructing and composing distributed business application and enabling enterprise-wide interoperability. A peer to peer arc...
Salima Benbernou, Mohand-Said Hacid
117
Voted
NAR
2011
235views Computer Vision» more  NAR 2011»
14 years 4 months ago
P2CS: a database of prokaryotic two-component systems
P2CS (http://www.p2cs.org) is a specialized database for prokaryotic two-component systems (TCSs), virtually ubiquitous signalling proteins which regulate a wide range of physiolo...
Mohamed Barakat, Philippe Ortet, David E. Whitwort...