Sciweavers

11594 search results - page 2095 / 2319
» Cooperation in Service Systems
Sort
View
ACNS
2011
Springer
241views Cryptology» more  ACNS 2011»
13 years 1 months ago
Misuse Detection in Consent-Based Networks
Consent-based networking, which requires senders to have permission to send traffic, can protect against multiple attacks on the network. Highly dynamic networks like Mobile Ad-hoc...
Mansoor Alicherry, Angelos D. Keromytis
CHI
2011
ACM
13 years 1 months ago
Twitinfo: aggregating and visualizing microblogs for event exploration
Microblogs are a tremendous repository of user-generated content about world events. However, for people trying to understand events by querying services like Twitter, a chronolog...
Adam Marcus 0002, Michael S. Bernstein, Osama Bada...
SIGCOMM
2012
ACM
12 years 23 days ago
HyperDex: a distributed, searchable key-value store
Distributed key-value stores are now a standard component of high-performance web services and cloud computing applications. While key-value stores offer significant performance...
Robert Escriva, Bernard Wong, Emin Gün Sirer
ICDE
2008
IEEE
2751views Database» more  ICDE 2008»
15 years 10 months ago
Skyline Query Processing for Incomplete Data
Recently, there has been much interest in processing skyline queries for various applications that include decision making, personalized services, and search pruning. Skyline queri...
Justin J. Levandoski, Mohamed E. Khalefa, Mohamed ...
ICDE
2009
IEEE
409views Database» more  ICDE 2009»
15 years 10 months ago
Chameleon: Context Awareness inside DBMSs
Context is any information used to characterize the situation of an entity. Examples of contexts includetime, location, identity, and activity of a user. This paper proposes a gene...
Hicham G. Elmongui, Walid G. Aref, Mohamed F. Mokb...
« Prev « First page 2095 / 2319 Last » Next »