Sciweavers

431 search results - page 82 / 87
» Automatic configuration of internet services
Sort
View
RAID
2005
Springer
14 years 3 months ago
Virtual Playgrounds for Worm Behavior Investigation
To detect and defend against Internet worms, researchers have long hoped to have a safe convenient environment to unleash and run real-world worms for close observation of their in...
Xuxian Jiang, Dongyan Xu, Helen J. Wang, Eugene H....
NAR
2000
127views more  NAR 2000»
13 years 9 months ago
The EMBL Nucleotide Sequence Database
The European Molecular Biology Laboratory (EMBL) Nucleotide Sequence Database (http://www.ebi.ac. uk/embl/index.html ) is maintained at the European Bioinformatics Institute (EBI)...
Wendy Baker, Alexandra van den Broek, Evelyn Camon...
PVLDB
2010
172views more  PVLDB 2010»
13 years 8 months ago
Secure Personal Data Servers: a Vision Paper
An increasing amount of personal data is automatically gathered and stored on servers by administrations, hospitals, insurance companies, etc. Citizen themselves often count on in...
Tristan Allard, Nicolas Anciaux, Luc Bouganim, Yan...
HT
2009
ACM
14 years 4 months ago
Cross-tagging for personalized open social networking
The Social Web is successfully established and poised for continued growth. Web 2.0 applications such as blogs, bookmarking, music, photo and video sharing systems are among the m...
Avare Stewart, Ernesto Diaz-Aviles, Wolfgang Nejdl...
IMC
2010
ACM
13 years 7 months ago
What happened in my network: mining network events from router syslogs
Router syslogs are messages that a router logs to describe a wide range of events observed by it. They are considered one of the most valuable data sources for monitoring network ...
Tongqing Qiu, Zihui Ge, Dan Pei, Jia Wang, Jun Xu