Sciweavers

519 search results - page 96 / 104
» Evaluation of a Read-Optimized Database for Dynamic Web Appl...
Sort
View
ECRTS
2010
IEEE
13 years 8 months ago
Deadline Assignment and Tardiness Control for Real-Time Data Services
It is challenging to support the timeliness of realtime data service requests in data-intensive real-time applications such as online auction or stock trading, while maintaining t...
Yan Zhou, Kyoung-Don Kang
CIKM
2000
Springer
13 years 12 months ago
Dimensionality Reduction and Similarity Computation by Inner Product Approximations
—As databases increasingly integrate different types of information such as multimedia, spatial, time-series, and scientific data, it becomes necessary to support efficient retri...
Ömer Egecioglu, Hakan Ferhatosmanoglu
BMCBI
2010
163views more  BMCBI 2010»
13 years 7 months ago
DraGnET: Software for storing, managing and analyzing annotated draft genome sequence data
Background: New "next generation" DNA sequencing technologies offer individual researchers the ability to rapidly generate large amounts of genome sequence data at drama...
Stacy Duncan, Ruchita Sirkanungo, Leslie Miller, G...
SIGECOM
2008
ACM
188views ECommerce» more  SIGECOM 2008»
13 years 7 months ago
Predicting trusts among users of online communities: an epinions case study
Trust between a pair of users is an important piece of information for users in an online community (such as electronic commerce websites and product review websites) where users ...
Haifeng Liu, Ee-Peng Lim, Hady Wirawan Lauw, Minh-...
ACSAC
2008
IEEE
14 years 2 months ago
Execution Trace-Driven Automated Attack Signature Generation
In its most general form, an attack signature is a program that can correctly determine if an input network packet sequence can successfully attack a protected network application...
Susanta Nanda, Tzi-cker Chiueh