Sciweavers

1929 search results - page 321 / 386
» An Approach to Limit the Wynot Problem
Sort
View
VLDB
2002
ACM
120views Database» more  VLDB 2002»
14 years 9 months ago
Efficient schemes for managing multiversionXML documents
Multiversion support for XML documents is needed in many critical applications, such as software configuration control, cooperative authoring, web information warehouses, and "...
Shu-Yao Chien, Vassilis J. Tsotras, Carlo Zaniolo
MOBIHOC
2005
ACM
14 years 8 months ago
Toward resilient security in wireless sensor networks
Node compromise poses severe security threats in wireless sensor networks. Unfortunately, existing security designs can address only a small, fixed threshold number of compromised...
Hao Yang, Fan Ye, Yuan Yuan, Songwu Lu, William A....
SIGCOMM
2009
ACM
14 years 3 months ago
SMS-based contextual web search
SMS-based web search is different from traditional web search in that the final response to a search query is limited to a very small number of bytes (typically 1-2 SMS messages...
Jay Chen, Brendan Linn, Lakshminarayanan Subramani...
NDSS
2008
IEEE
14 years 3 months ago
Automatic Network Protocol Analysis
Protocol reverse engineering is the process of extracting application-level specifications for network protocols. Such specifications are very helpful in a number of security-re...
Gilbert Wondracek, Paolo Milani Comparetti, Christ...
GCB
2007
Springer
91views Biometrics» more  GCB 2007»
14 years 2 months ago
Integrative Analysis of Transcriptome and Metabolome Data
Biological systems have to react to environmental and/or developmental changes by adjusting their biochemical/cellular machinery on numerous levels. In many cases small molecules ...
Lothar Willmitzer, Camila Caldana, Alisdair R. Fer...