Sciweavers

3099 search results - page 502 / 620
» Generating Web Monitors
Sort
View
138
Voted
ASIACRYPT
2010
Springer
15 years 16 days ago
Structured Encryption and Controlled Disclosure
We consider the problem of encrypting structured data (e.g., a web graph or a social network) in such a way that it can be efficiently and privately queried. For this purpose, we ...
Melissa Chase, Seny Kamara
128
Voted
WEBI
2010
Springer
15 years 10 days ago
A Scalable Indexing Mechanism for Ontology-Based Information Integration
In recent years, there has been an explosion of publicly available RDF and OWL web pages. Some of these pages are static text files, while others are dynamically generated from la...
Yingjie Li, Abir Qasem, Jeff Heflin
149
Voted
TASE
2010
IEEE
14 years 9 months ago
Clear and Precise Specification of Ecological Data Management Processes and Dataset Provenance
Abstract--With the availability of powerful computational and communication systems, scientists now readily access large, complicated derived datasets and build on those results to...
Leon J. Osterweil, Lori A. Clarke, Aaron M. Elliso...
125
Voted
NAR
2011
214views Computer Vision» more  NAR 2011»
14 years 5 months ago
starBase: a database for exploring microRNA-mRNA interaction maps from Argonaute CLIP-Seq and Degradome-Seq data
MicroRNAs (miRNAs) represent an important class of small non-coding RNAs (sRNAs) that regulate gene expression by targeting messenger RNAs. However, assigning miRNAs to their regu...
Jian-Hua Yang, Jun-Hao Li, Peng Shao, Hui Zhou, Yu...
137
Voted
ICC
2009
IEEE
150views Communications» more  ICC 2009»
15 years 9 months ago
Modeling Human Behavior for Defense Against Flash-Crowd Attacks
—Flash-crowd attacks are the most vicious form of distributed denial of service (DDoS). They flood the victim with service requests generated from numerous bots. Attack requests...
Georgios Oikonomou, Jelena Mirkovic