Sciweavers

4085 search results - page 648 / 817
» Data Services - From Data to Containers
Sort
View
VMCAI
2005
Springer
15 years 9 months ago
Cryptographic Protocol Analysis on Real C Code
Abstract. Implementations of cryptographic protocols, such as OpenSSL for example, contain bugs affecting security, which cannot be detected by just analyzing abstract protocols (e...
Jean Goubault-Larrecq, Fabrice Parrennes
W2GIS
2005
Springer
15 years 9 months ago
The Self-relocating Index Scheme for Telematics GIS
The history management of vehicles is important in telematics applications. To process queries for history data, trajectories, we generally use trajectory-preserving index schemes ...
Duksung Lim, Bonghee Hong, Daesoo Cho
WABI
2005
Springer
110views Bioinformatics» more  WABI 2005»
15 years 9 months ago
Alignment of Tandem Repeats with Excision, Duplication, Substitution and Indels (EDSI)
Abstract. Traditional sequence comparison by alignment applies a mutation model comprising two events, substitutions and indels (insertions or deletions) of single positions (SI). ...
Michael Sammeth, Thomas Weniger, Dag Harmsen, Jens...
MM
2004
ACM
151views Multimedia» more  MM 2004»
15 years 9 months ago
Affinity relation discovery in image database clustering and content-based retrieval
In this paper, we propose a unified framework, called Markov Model Mediator (MMM), to facilitate image database clustering and to improve the query performance. The structure of t...
Mei-Ling Shyu, Shu-Ching Chen, Min Chen, Chengcui ...
WMPI
2004
ACM
15 years 9 months ago
Selective main memory compression by identifying program phase changes
During a program’s runtime, the stack and data segments of the main memory often contain much redundancy, which makes them good candidates for compression. Compression and decomp...
Doron Nakar, Shlomo Weiss