Sciweavers

489 search results - page 97 / 98
» Reasoning about confidentiality at requirements engineering ...
Sort
View
126
Voted
CCS
2011
ACM
13 years 10 months ago
MIDeA: a multi-parallel intrusion detection architecture
Network intrusion detection systems are faced with the challenge of identifying diverse attacks, in extremely high speed networks. For this reason, they must operate at multi-Giga...
Giorgos Vasiliadis, Michalis Polychronakis, Sotiri...
PODS
2010
ACM
150views Database» more  PODS 2010»
15 years 3 months ago
Understanding queries in a search database system
It is well known that a search engine can significantly benefit from an auxiliary database, which can suggest interpretations of the search query by means of the involved concep...
Ronald Fagin, Benny Kimelfeld, Yunyao Li, Sriram R...
87
Voted
BMCBI
2008
118views more  BMCBI 2008»
14 years 10 months ago
DOVIS: an implementation for high-throughput virtual screening using AutoDock
Background: Molecular-docking-based virtual screening is an important tool in drug discovery that is used to significantly reduce the number of possible chemical compounds to be i...
Shuxing Zhang, Kamal Kumar, Xiaohui Jiang, Anders ...
126
Voted
EUROSYS
2010
ACM
15 years 4 months ago
PUSH: A Dataflow Shell
The deluge of huge data sets such as those provided by sensor networks, online transactions, and the web provide exciting opportunities for data analysis. The scale of the data ...
Noah Evans, Eric Van Hensbergen
89
Voted
ECLIPSE
2004
ACM
15 years 3 months ago
An Eclipse-based course project snapshot and submission system
Much research has been done on techniques to teach students how to program. However, it is usually difficult to quantify exactly how students work. Instructors typically only see ...
Jaime Spacco, David Hovemeyer, William Pugh