Sciweavers

5758 search results - page 1134 / 1152
» Anonymity-preserving data collection
Sort
View
HPDC
2006
IEEE
14 years 2 months ago
Exploring I/O Strategies for Parallel Sequence-Search Tools with S3aSim
Parallel sequence-search tools are rising in popularity among computational biologists. With the rapid growth of sequence databases, database segmentation is the trend of the futu...
Avery Ching, Wu-chun Feng, Heshan Lin, Xiaosong Ma...
IPPS
2006
IEEE
14 years 2 months ago
Trust overlay networks for global reputation aggregation in P2P grid computing
1 This paper presents a new approach to trusted Grid computing in a Peer-to-Peer (P2P) setting. Trust and security are essential to establish lasting working relationships among th...
Runfang Zhou, Kai Hwang
NDSS
2006
IEEE
14 years 2 months ago
Modeling Botnet Propagation Using Time Zones
Time zones play an important and unexplored role in malware epidemics. To understand how time and location affect malware spread dynamics, we studied botnets, or large coordinated...
David Dagon, Cliff Changchun Zou, Wenke Lee
SECPERU
2006
IEEE
14 years 2 months ago
Detecting Critical Nodes for MANET Intrusion Detection Systems
Ad hoc routing protocols have been designed to efficiently reroute traffic when confronted with network congestion, faulty nodes, and dynamically changing topologies. The common d...
A. Karygiannis, E. Antonakakis, A. Apostolopoulos
TAICPART
2006
IEEE
144views Education» more  TAICPART 2006»
14 years 2 months ago
Testing the Implementation of Business Rules Using Intensional Database Tests
One of the key roles of any information system is to enforce the business rules and policies set by the owning organisation. As for any important functionality, it is necessary to...
David Willmor, Suzanne M. Embury
« Prev « First page 1134 / 1152 Last » Next »