Sciweavers

6689 search results - page 1272 / 1338
» A Network Security Monitor
Sort
View
IC3
2009
13 years 7 months ago
IDChase: Mitigating Identifier Migration Trap in Biological Databases
A convenient mechanism to refer to large biological objects such as sequences, structures and networks is the use of identifiers or handles, commonly called IDs. IDs function as a ...
Anupam Bhattacharjee, Aminul Islam, Hasan M. Jamil...
ICDE
2009
IEEE
216views Database» more  ICDE 2009»
13 years 7 months ago
Continuous Subgraph Pattern Search over Graph Streams
Search over graph databases has attracted much attention recently due to its usefulness in many fields, such as the analysis of chemical compounds, intrusion detection in network t...
Changliang Wang, Lei Chen 0002
CORR
2010
Springer
115views Education» more  CORR 2010»
13 years 7 months ago
Novel Mechanism to Defend DDoS Attacks Caused by Spam
Corporate mail services are designed to perform better than public mail services. Fast mail delivery, large size file transfer as an attachments, high level spam and virus protect...
Dhinaharan Nagamalai, Beatrice Cynthia Dhinakaran,...
WH
2010
185views Healthcare» more  WH 2010»
13 years 4 months ago
Blood oxygen estimation from compressively sensed photoplethysmograph
In this work, we consider low power, wearable pulse oximeter sensors for ambulatory, remote vital signs monitoring applications. It is extremely important for such sensors to main...
Pawan K. Baheti, Harinath Garudadri, Somdeb Majumd...
ICASSP
2011
IEEE
13 years 1 months ago
Modeling nodal prices in deregulated electricity markets in the usa: current practices and future needs
The purpose of this paper is to model the stochastic behavior of the nodal prices of electricity in deregulated markets in the USA, and in particular, to explain how this behavior...
Timothy D. Mount
« Prev « First page 1272 / 1338 Last » Next »