Sciweavers

10040 search results - page 1893 / 2008
» On Information Lifecycle Management
Sort
View
CCR
2006
110views more  CCR 2006»
15 years 4 months ago
Estimating network proximity and latency
Network proximity and latency estimation is an important component in discovering and locating services and applications. With the growing number of services and service providers...
Puneet Sharma, Zhichen Xu, Sujata Banerjee, Sung-J...
136
Voted
IANDC
2006
77views more  IANDC 2006»
15 years 4 months ago
Lower and upper bounds on obtaining history independence
Abstract. History independent data structures, presented by Micciancio, are data structures that possess a strong security property: even if an intruder manages to get a copy of th...
Niv Buchbinder, Erez Petrank
154
Voted
IDA
2006
Springer
15 years 4 months ago
Backward chaining rule induction
Exploring the vast number of possible feature interactions in domains such as gene expression microarray data is an onerous task. We describe Backward-Chaining Rule Induction (BCR...
Douglas H. Fisher, Mary E. Edgerton, Zhihua Chen, ...
DEBU
2007
211views more  DEBU 2007»
15 years 4 months ago
Provenance in Databases: Past, Current, and Future
The need to understand and manage provenance arises in almost every scientific application. In many cases, information about provenance constitutes the proof of correctness of re...
Wang Chiew Tan
NAR
2008
138views more  NAR 2008»
15 years 4 months ago
TarO: a target optimisation system for structural biology
TarO (http://www.compbio.dundee.ac.uk/taro) offers a single point of reference for key bioinformatics analyses relevant to selecting proteins or domains for study by structural bi...
Ian M. Overton, C. A. Johannes van Niekerk, Lester...
« Prev « First page 1893 / 2008 Last » Next »