Sciweavers

2236 search results - page 380 / 448
» Intrusion detection techniques and approaches
Sort
View
SIGMOD
2010
ACM
267views Database» more  SIGMOD 2010»
14 years 1 months ago
Processing proximity relations in road networks
Applications ranging from location-based services to multi-player online gaming require continuous query support to monitor, track, and detect events of interest among sets of mov...
Zhengdao Xu, Hans-Arno Jacobsen
JCB
2008
91views more  JCB 2008»
13 years 9 months ago
Computational Quantification of Peptides from LC-MS Data
Liquid chromatography coupled to mass spectrometry (LC-MS) has become a major tool for the study of biological processes. High-throughput LC-MS experiments are frequently conducte...
Ole Schulz-Trieglaff, Rene Hussong, Clemens Gr&oum...
EDBT
2009
ACM
136views Database» more  EDBT 2009»
14 years 3 months ago
Rule-based multi-query optimization
Data stream management systems usually have to process many long-running queries that are active at the same time. Multiple queries can be evaluated more efficiently together tha...
Mingsheng Hong, Mirek Riedewald, Christoph Koch, J...
VTC
2008
IEEE
117views Communications» more  VTC 2008»
14 years 3 months ago
Design of Rate Constrained Multi-User Receivers for Satellite Communications
—In the realm of satellite communications, one of the great impairments to increase the spectral efficiency is multi-user interference in the reverse link (mobile to satellite). ...
Sami Mekki, Mérouane Debbah
ICS
2007
Tsinghua U.
14 years 3 months ago
Proactive fault tolerance for HPC with Xen virtualization
Large-scale parallel computing is relying increasingly on clusters with thousands of processors. At such large counts of compute nodes, faults are becoming common place. Current t...
Arun Babu Nagarajan, Frank Mueller, Christian Enge...