Sciweavers

653 search results - page 96 / 131
» ASP: from Application Development to Syntax Extensions
Sort
View
WWW
2009
ACM
14 years 8 months ago
PAKE-based mutual HTTP authentication for preventing phishing attacks
We developed a new Web authentication protocol with passwordbased mutual authentication which prevents various kinds of phishing attacks. This protocol provides a protection of us...
Yutaka Oiwa, Hiromitsu Takagi, Hajime Watanabe, Hi...
KDD
2003
ACM
152views Data Mining» more  KDD 2003»
14 years 8 months ago
Interactive exploration of coherent patterns in time-series gene expression data
Discovering coherent gene expression patterns in time-series gene expression data is an important task in bioinformatics research and biomedical applications. In this paper, we pr...
Daxin Jiang, Jian Pei, Aidong Zhang
DASFAA
2009
IEEE
93views Database» more  DASFAA 2009»
14 years 2 months ago
Top-K Correlation Sub-graph Search in Graph Databases
Recently, due to its wide applications, (similar) subgraph search has attracted a lot of attentions from database and data mining community, such as [13, 18, 19, 5]. In [8], Ke et ...
Lei Zou, Lei Chen 0002, Yansheng Lu
GLOBECOM
2009
IEEE
14 years 2 months ago
SV-BCMCS: Scalable Video Multicast in Hybrid 3G/Ad-Hoc Networks
—Mobile video broadcasting service, or mobile TV, is a promising application for 3G wireless network operators. Most existing solutions for video broadcast/multicast services in ...
Sha Hua, Yang Guo, Yong Liu, Hang Liu, Shivendra S...
CGO
2007
IEEE
14 years 1 months ago
Exploiting Narrow Accelerators with Data-Centric Subgraph Mapping
The demand for high performance has driven acyclic computation accelerators into extensive use in modern embedded and desktop architectures. Accelerators that are ideal from a sof...
Amir Hormati, Nathan Clark, Scott A. Mahlke