Sciweavers

10210 search results - page 2022 / 2042
» Configuring Database Systems
Sort
View
CCS
2008
ACM
13 years 10 months ago
Mitigating DNS DoS attacks
This paper considers DoS attacks on DNS wherein attackers flood the nameservers of a zone to disrupt resolution of resource records belonging to the zone and consequently, any of ...
Hitesh Ballani, Paul Francis
CIKM
2008
Springer
13 years 10 months ago
SNIF TOOL: sniffing for patterns in continuous streams
Continuous time-series sequence matching, specifically, matching a numeric live stream against a set of predefined pattern sequences, is critical for domains ranging from fire spr...
Abhishek Mukherji, Elke A. Rundensteiner, David C....
CIKM
2008
Springer
13 years 10 months ago
How should users access the content of digital books?
I report briefly on some of my own work in each of these areas and elucidate some of the questions that this research has raised. Then I propose as a research agenda the developme...
Nina Wacholder
DILS
2008
Springer
13 years 10 months ago
VisGenome and Ensembl: Usability of Integrated Genome Maps
It is not always clear how best to represent integrated data sets, and which application and database features allow a scientist to take best advantage of data coming from various ...
Joanna Jakubowska, Ela Hunt, John McClure, Matthew...
DIMEA
2008
170views Multimedia» more  DIMEA 2008»
13 years 10 months ago
Embodiment in data sculpture: a model of the physical visualization of information
Information is becoming pervasive in the contemporary society, and is increasingly saturating the visual senses and the cognitive efforts of the lay masses. As our attention for v...
Jack Zhao, Andrew Vande Moere
« Prev « First page 2022 / 2042 Last » Next »