Sciweavers

2043 search results - page 342 / 409
» The Limits of Querying Ontologies
Sort
View
106
Voted
LISA
2007
15 years 3 months ago
Assisted Firewall Policy Repair Using Examples and History
Firewall policies can be extremely complex and difficult to maintain, especially on networks with more than a few hundred machines. The difficulty of configuring a firewall proper...
Robert M. Marmorstein, Phil Kearns
121
Voted
ICWN
2008
15 years 2 months ago
Progressive Content-Sensitive Data Retrieval in Sensor Networks
: Problem statement: For a sensor network comprising autonomous and self-organizing data sources, efficient similarity-based search for semantic-rich resources (such as video data)...
Bo Yang, Mareboyana Manohar, Shaoying Kou
150
Voted
SIGCOMM
2010
ACM
15 years 28 days ago
Trust no one: a decentralized matching service for privacy in location based services
We propose a new approach to ensure privacy in location based services, without requiring any support from a"trusted" entity. We observe that users of location based ser...
Sharad Jaiswal, Animesh Nandi
104
Voted
BMCBI
2008
75views more  BMCBI 2008»
15 years 25 days ago
Re-searcher: a system for recurrent detection of homologous protein sequences
Background: Sequence searches are routinely employed to detect and annotate related proteins. However, a rapid growth of databases necessitates a frequent repetition of sequence s...
Valdemaras Repsys, Mindaugas Margelevicius, Ceslov...
122
Voted
IJCSA
2006
113views more  IJCSA 2006»
15 years 22 days ago
An Advanced XML Mediator for Heterogeneous Information Systems Based on Application Domain Specification
The explosion of the number of web-based information sources has drastically increased the need for intelligent mediation tools to be implemented between the users and these infor...
Mostafa Ezziyyani, Mustapha Bennouna, Loubna Cherr...