Sciweavers

1950 search results - page 311 / 390
» Two Abstractions for Distributed Systems of Mobile Nodes
Sort
View
CORR
2002
Springer
93views Education» more  CORR 2002»
15 years 4 months ago
Secure History Preservation Through Timeline Entanglement
A secure timeline is a tamper-evident historic record of the states through which a system goes throughout its operational history. Secure timelines can help us reason about the t...
Petros Maniatis, Mary Baker
ICC
2007
IEEE
147views Communications» more  ICC 2007»
15 years 11 months ago
A Cooperative AIS Framework for Intrusion Detection
Abstract— We present a cooperative intrusion detection approach inspired by biological immune system principles and P2P communication techniques to develop a distributed anomaly ...
Katja Luther, Rainer Bye, Tansu Alpcan, Achim M&uu...
LCPC
2004
Springer
15 years 10 months ago
Supporting SQL-3 Aggregations on Grid-Based Data Repositories
There is an increasing trends towards distributed and shared repositories for storing scientific datasets. Developing applications that retrieve and process data from such reposit...
Li Weng, Gagan Agrawal, Ümit V. Çataly...
JOCN
2010
129views more  JOCN 2010»
15 years 3 months ago
Arabic Morphology in the Neural Language System
■ There are two views about morphology, the aspect of language concerned with the internal structure of words. One view holds that morphology is a domain of knowledge with a spe...
Sami Boudelaa, Friedemann Pulvermüller, Olaf ...
AIRWEB
2008
Springer
15 years 7 months ago
Robust PageRank and locally computable spam detection features
Since the link structure of the web is an important element in ranking systems on search engines, web spammers widely use the link structure of the web to increase the rank of the...
Reid Andersen, Christian Borgs, Jennifer T. Chayes...