Sciweavers

515 search results - page 75 / 103
» A Strategy for Information Source Identification
Sort
View
INFOCOM
2003
IEEE
14 years 4 months ago
A Framework for Reliable Routing in Mobile Ad Hoc Networks
— Mobile ad hoc networks consist of nodes that are often vulnerable to failure. As such, it is important to provide redundancy in terms of providing multiple nodedisjoint paths f...
Zhenqiang Ye, Srikanth V. Krishnamurthy, Satish K....
DEBU
2000
147views more  DEBU 2000»
13 years 10 months ago
XJoin: A Reactively-Scheduled Pipelined Join Operator
Wide-area distribution raises significant performance problems for traditional query processing techniques as data access becomes less predictable due to link congestion, load imb...
Tolga Urhan, Michael J. Franklin
ICDE
2007
IEEE
127views Database» more  ICDE 2007»
15 years 7 days ago
Supporting Streaming Updates in an Active Data Warehouse
Active Data Warehousing has emerged as an alternative to conventional warehousing practices in order to meet the high demand of applications for up-to-date information. In a nutsh...
Neoklis Polyzotis, Spiros Skiadopoulos, Panos Vass...
CCS
2007
ACM
14 years 2 months ago
Highly efficient techniques for network forensics
Given a history of packet transmissions and an excerpt of a possible packet payload, the payload attribution problem requires the identification of sources, destinations and the t...
Miroslav Ponec, Paul Giura, Hervé Brön...
ALMOB
2008
124views more  ALMOB 2008»
13 years 11 months ago
A scoring matrix approach to detecting miRNA target sites
Background: Experimental identification of microRNA (miRNA) targets is a difficult and time consuming process. As a consequence several computational prediction methods have been ...
Simon Moxon, Vincent Moulton, Jan T. Kim