Sciweavers

823 search results - page 151 / 165
» Distributed Cipher Services Using Object Activation
Sort
View
BMCBI
2006
128views more  BMCBI 2006»
13 years 8 months ago
Model-driven user interfaces for bioinformatics data resources: regenerating the wheel as an alternative to reinventing it
Background: The proliferation of data repositories in bioinformatics has resulted in the development of numerous interfaces that allow scientists to browse, search and analyse the...
Kevin L. Garwood, Christopher Garwood, Cornelia He...
SP
2008
IEEE
138views Security Privacy» more  SP 2008»
14 years 2 months ago
Practical Proactive Integrity Preservation: A Basis for Malware Defense
Unlike today’s reactive approaches, information flow based approaches can provide positive assurances about overall system integrity, and hence can defend against sophisticated...
Weiqing Sun, R. Sekar, Gaurav Poothia, Tejas Karan...
LAWEB
2007
IEEE
14 years 2 months ago
Geographical Characterization of YouTube: a Latin American View
Online social media applications have exploded in popularity in the Web. In most of these applications, users interact with other users and create content that becomes available o...
Fernando Duarte, Fabrício Benevenuto, Virgi...
SAC
2005
ACM
14 years 1 months ago
A generic serializer for mobile devices
In this paper we describe a serializer component completely realized in .NET managed code, able to run on a stripped versions of the .NET platform (e.g., Compact Framework) and st...
Mattia Monga, Angelo Scotto
FAST
2009
13 years 5 months ago
BORG: Block-reORGanization for Self-optimizing Storage Systems
This paper presents the design, implementation, and evaluation of BORG, a self-optimizing storage system that performs automatic block reorganization based on the observed I/O wor...
Medha Bhadkamkar, Jorge Guerra, Luis Useche, Sam B...