Sciweavers

325 search results - page 51 / 65
» Collection and Exploration of Large Data Monitoring Sets Usi...
Sort
View
TMC
2010
179views more  TMC 2010»
13 years 6 months ago
On Fast and Accurate Detection of Unauthorized Wireless Access Points Using Clock Skews
We explore the use of clock skew of a wireless local area network access point (AP) as its fingerprint to detect unauthorized APs quickly and accurately. The main goal behind usi...
Suman Jana, Sneha Kumar Kasera
SIGMOD
2002
ACM
127views Database» more  SIGMOD 2002»
14 years 7 months ago
Approximate XML joins
XML is widely recognized as the data interchange standard for tomorrow, because of its ability to represent data from a wide variety of sources. Hence, XML is likely to be the for...
Sudipto Guha, H. V. Jagadish, Nick Koudas, Divesh ...
BMCBI
2004
131views more  BMCBI 2004»
13 years 7 months ago
Alternative mapping of probes to genes for Affymetrix chips
Background: Short oligonucleotide arrays have several probes measuring the expression level of each target transcript. Therefore the selection of probes is a key component for the...
Laurent Gautier, Morten Møller, Lennart Fri...
SSDBM
2007
IEEE
116views Database» more  SSDBM 2007»
14 years 1 months ago
A Distributed Algorithm for Joins in Sensor Networks
Given their autonomy, flexibility and large range of functionality, wireless sensor networks can be used as an effective and discrete means for monitoring data in many domains. T...
Alexandru Coman, Mario A. Nascimento
VLDB
2004
ACM
120views Database» more  VLDB 2004»
14 years 1 months ago
Relational link-based ranking
Link analysis methods show that the interconnections between web pages have lots of valuable information. The link analysis methods are, however, inherently oriented towards analy...
Floris Geerts, Heikki Mannila, Evimaria Terzi