Sciweavers

6583 search results - page 1155 / 1317
» Semantic Analysis Patterns
Sort
View
JOCN
2010
99views more  JOCN 2010»
15 years 2 months ago
Right-lateralized Brain Oscillations in Human Spatial Navigation
■ During spatial navigation, lesion and functional imaging studies suggest that the right hemisphere has a unique functional role. However, studies of direct human brain recordi...
Joshua Jacobs, Igor O. Korolev, Jeremy B. Caplan, ...
NPC
2010
Springer
15 years 2 months ago
Improve Throughput of Storage Cluster Interconnected with a TCP/IP Network Using Intelligent Server Grouping
Abstract. Cluster-based storage systems connected with TCP/IP networks are expected to achieve a high throughput by striping files across multiple storage servers. However, for th...
Xuechen Zhang, Guiquan Liu, Song Jiang
PC
2010
111views Management» more  PC 2010»
15 years 2 months ago
Reducing complexity in tree-like computer interconnection networks
The fat-tree is one of the topologies most widely used to build high-performance parallel computers. However, they are expensive and difficult to build. In this paper we propose t...
Javier Navaridas, José Miguel-Alonso, Franc...
PVLDB
2010
168views more  PVLDB 2010»
15 years 2 months ago
Active Complex Event Processing: Applications in Real-Time Health Care
Our analysis of many real-world event based applications has revealed that existing Complex Event Processing technology (CEP), while effective for efficient pattern matching on e...
Di Wang, Elke A. Rundensteiner, Richard Ellison, H...
SEKE
2010
Springer
15 years 2 months ago
A String Constraint Solver for Detecting Web Application Vulnerability
Given the bytecode of a software system, is it possible to automatically generate attack signatures that reveal its vulnerabilities? A natural solution would be symbolically execu...
Xiang Fu, Chung-Chih Li
« Prev « First page 1155 / 1317 Last » Next »