Sciweavers

2842 search results - page 496 / 569
» Expansion and Search in Networks
Sort
View
CCS
2009
ACM
14 years 10 months ago
Semantic context aware security policy deployment
The successful deployment of a security policy is closely related not only to the complexity of the security requirements but also to the capabilities/functionalities of the secur...
Frédéric Cuppens, Joaquín Gar...
RECOMB
2003
Springer
14 years 10 months ago
A multi-expert system for the automatic detection of protein domains from sequence information
We describe a novel method for detecting the domain structure of a protein from sequence information alone. The method is based on analyzing multiple sequence alignments that are ...
Niranjan Nagarajan, Golan Yona
SIGMOD
2006
ACM
174views Database» more  SIGMOD 2006»
14 years 10 months ago
Dynamic authenticated index structures for outsourced databases
In outsourced database (ODB) systems the database owner publishes its data through a number of remote servers, with the goal of enabling clients at the edge of the network to acce...
Feifei Li, Marios Hadjieleftheriou, George Kollios...
SIGMOD
2004
ACM
127views Database» more  SIGMOD 2004»
14 years 10 months ago
Efficient Query Reformulation in Peer-Data Management Systems
Peer data management systems (PDMS) offer a flexible architecture for decentralized data sharing. In a PDMS, every peer is associated with a schema that represents the peer's...
Igor Tatarinov, Alon Y. Halevy
IUI
2009
ACM
14 years 7 months ago
You can play that again: exploring social redundancy to derive highlight regions in videos
Identifying highlights in multimedia content such as video and audio is currently a very difficult technical problem. We present and evaluate a novel algorithm that identifies hig...
Jose San Pedro, Vaiva Kalnikaité, Steve Whi...