Sciweavers

13966 search results - page 2780 / 2794
» Internet as a
Sort
View
JUCS
2010
114views more  JUCS 2010»
13 years 2 months ago
On Reliable Platform Configuration Change Reporting Mechanisms for Trusted Computing Enabled Platforms
: One of the most important use-cases of Trusted Computing is Remote Attestation. It allows platforms to get a trustworthy proof of the loaded software and current configuration of...
Kurt Dietrich
NAR
2010
281views more  NAR 2010»
13 years 2 months ago
PDBselect 1992-2009 and PDBfilter-select
PDBselect (http://bioinfo.tg.fh-giessen.de/pdb select/) is a list of representative protein chains with low mutual sequence identity selected from the protein data bank (PDB) to e...
Sven Griep, Uwe Hobohm
SIGMOD
2010
ACM
132views Database» more  SIGMOD 2010»
13 years 2 months ago
Durable top-k search in document archives
We propose and study a new ranking problem in versioned databases. Consider a database of versioned objects which have different valid instances along a history (e.g., documents i...
Leong Hou U, Nikos Mamoulis, Klaus Berberich, Srik...
TASE
2010
IEEE
13 years 2 months ago
Clear and Precise Specification of Ecological Data Management Processes and Dataset Provenance
Abstract--With the availability of powerful computational and communication systems, scientists now readily access large, complicated derived datasets and build on those results to...
Leon J. Osterweil, Lori A. Clarke, Aaron M. Elliso...
TCIAIG
2010
13 years 2 months ago
Game Bot Detection via Avatar Trajectory Analysis
The objective of this work is to automatically detect the use of game bots in online games based on the trajectories of account users. Online gaming has become one of the most popu...
Hsing-Kuo Pao, Kuan-Ta Chen, Hong-Chung Chang
« Prev « First page 2780 / 2794 Last » Next »