Sciweavers

680 search results - page 19 / 136
» Locating Hidden Servers
Sort
View
ACNS
2010
Springer
150views Cryptology» more  ACNS 2010»
14 years 2 months ago
Regulatory Compliant Oblivious RAM
Abstract. We introduce WORM-ORAM, a first mechanism that combines Oblivious RAM (ORAM) access privacy and data confidentiality with Write Once Read Many (WORM) regulatory data re...
Bogdan Carbunar, Radu Sion
NAR
2006
119views more  NAR 2006»
13 years 10 months ago
HHsenser: exhaustive transitive profile search using HMM-HMM comparison
HHsenser is the first server to offer exhaustive intermediate profile searches, which it combines with pairwise comparison of hidden Markov models. Starting from a single protein ...
Johannes Söding, Michael Remmert, Andreas Bie...
DEXAW
1998
IEEE
92views Database» more  DEXAW 1998»
14 years 2 months ago
Self-Configuring Components for Client-/Server-Applications
A mechanistic view of software component assembly implies exact matching and fitting of the particular components. We argue that components for large-scale software construction s...
Wolfgang Pree, Egbert Althammer, Hermann Sikora
IJWIS
2007
77views more  IJWIS 2007»
13 years 10 months ago
World's first web census
: Purpose — To measure the exact size of the World Wide Web (i.e., a census). The measure used is the number of publicly accessible web servers on port 80. Design/methodology/app...
Darcy G. Benoit, André Trudel
SRDS
1998
IEEE
14 years 2 months ago
Tolerating Visitor Location Register Failures in Mobile Environments
For mobile users who move frequently but receive relatively rare calls, a forwarding scheme has been shown to outperform the normal IS-41 location management scheme. But the forwa...
Saad Biaz, Nitin H. Vaidya