Sciweavers

995 search results - page 187 / 199
» Intrusion ripple analysis in distributed information systems
Sort
View
BMCBI
2006
118views more  BMCBI 2006»
13 years 7 months ago
Exploration of biological network centralities with CentiBiN
Background: The elucidation of whole-cell regulatory, metabolic, interaction and other biological networks generates the need for a meaningful ranking of network elements. Central...
Björn H. Junker, Dirk Koschützki, Falk S...
ICDCS
2010
IEEE
13 years 4 months ago
Secure Ranked Keyword Search over Encrypted Cloud Data
As Cloud Computing becomes prevalent, sensitive information are being increasingly centralized into the cloud. For the protection of data privacy, sensitive data has to be encrypte...
Cong Wang, Ning Cao, Jin Li, Kui Ren, Wenjing Lou
GIS
2004
ACM
14 years 8 months ago
Road extraction from motion cues in aerial video
Aerial video provides strong cues for automatic road extraction that are not available in static aerial images. Using stabilized (or geo-referenced) video data, capturing the dist...
Robert Pless, David Jurgens
KDD
2006
ACM
145views Data Mining» more  KDD 2006»
14 years 7 months ago
Deriving quantitative models for correlation clusters
Correlation clustering aims at grouping the data set into correlation clusters such that the objects in the same cluster exhibit a certain density and are all associated to a comm...
Arthur Zimek, Christian Böhm, Elke Achtert, H...
NETGAMES
2005
ACM
14 years 28 days ago
Dissecting server-discovery traffic patterns generated by multiplayer first person shooter games
We study the ‘background traffic’ resulting from tens of thousands of networked first person shooter (FPS) clients searching for servers on which to play. Networked, multiplay...
Sebastian Zander, David Kennedy, Grenville J. Armi...