Sciweavers

290 search results - page 55 / 58
» New NFS Tracing Tools and Techniques for System Analysis
Sort
View
CCS
2009
ACM
14 years 2 months ago
Robust signatures for kernel data structures
Kernel-mode rootkits hide objects such as processes and threads using a technique known as Direct Kernel Object Manipulation (DKOM). Many forensic analysis tools attempt to detect...
Brendan Dolan-Gavitt, Abhinav Srivastava, Patrick ...
CLEF
2005
Springer
14 years 1 months ago
The Use of MedGIFT and EasyIR for ImageCLEF 2005
This article describes the use of the medGIFT and easyIR retrieval systems for three of the four ImageCLEF 2005 retrieval tasks. We participated in the ad–hoc retrieval task that...
Henning Müller, Antoine Geissbühler, Joh...
DILS
2008
Springer
13 years 9 months ago
VisGenome and Ensembl: Usability of Integrated Genome Maps
It is not always clear how best to represent integrated data sets, and which application and database features allow a scientist to take best advantage of data coming from various ...
Joanna Jakubowska, Ela Hunt, John McClure, Matthew...
BMCBI
2006
118views more  BMCBI 2006»
13 years 7 months ago
Exploration of biological network centralities with CentiBiN
Background: The elucidation of whole-cell regulatory, metabolic, interaction and other biological networks generates the need for a meaningful ranking of network elements. Central...
Björn H. Junker, Dirk Koschützki, Falk S...
SIGMOD
2006
ACM
149views Database» more  SIGMOD 2006»
14 years 7 months ago
Efficient query processing on unstructured tetrahedral meshes
Modern scientific applications consume massive volumes of data produced by computer simulations. Such applications require new data management capabilities in order to scale to te...
Stratos Papadomanolakis, Anastassia Ailamaki, Juli...