Sciweavers

554 search results - page 82 / 111
» A New Approach For Source Authentication Of Multicast Data
Sort
View
CIKM
2006
Springer
14 years 13 days ago
Heuristic containment check of partial tree-pattern queries in the presence of index graphs
The wide adoption of XML has increased the interest of the database community on tree-structured data management techniques. Querying capabilities are provided through tree-patter...
Dimitri Theodoratos, Stefanos Souldatos, Theodore ...
JNW
2008
83views more  JNW 2008»
13 years 8 months ago
Substantiating Timing and Behavioral Anomalies in Wireless LANs Using GCL
With the increasing dependence on wireless LANs (WLANs), businesses, educational institutions and other organizations are in need of a reliable security mechanism. The latest secur...
Elankayer Sithirasenan, Vallipuram Muthukkumarasam...
BMCBI
2007
154views more  BMCBI 2007»
13 years 8 months ago
Inferring biological networks with output kernel trees
Background: Elucidating biological networks between proteins appears nowadays as one of the most important challenges in systems biology. Computational approaches to this problem ...
Pierre Geurts, Nizar Touleimat, Marie Dutreix, Flo...
ECTEL
2007
Springer
14 years 2 months ago
Model Driven E-Learning Platform Integration
The success of the e-learning paradigm observed in recent times created a growing demand for e-learning systems in universities and other educational institutions, that itself led ...
Zuzana Bizonova
DEBU
2000
90views more  DEBU 2000»
13 years 8 months ago
Personal Views for Web Catalogs
Large growth in e-commerce has culiminated in technology boom to enable companies to better serve their consumers. The front-end of the e-commerce business is to better reach the ...
Kajal T. Claypool, Li Chen, Elke A. Rundensteiner