Sciweavers

2472 search results - page 462 / 495
» Parallel Key Exchange
Sort
View
158
Voted
SDM
2012
SIAM
297views Data Mining» more  SDM 2012»
13 years 4 months ago
A Flexible Open-Source Toolbox for Scalable Complex Graph Analysis
The Knowledge Discovery Toolbox (KDT) enables domain experts to perform complex analyses of huge datasets on supercomputers using a high-level language without grappling with the ...
Adam Lugowski, David M. Alber, Aydin Buluç,...
WWW
2005
ACM
16 years 3 months ago
Information search and re-access strategies of experienced web users
Experienced web users have strategies for information search and re-access that are not directly supported by web browsers or search engines. We studied how prevalent these strate...
Anne Aula, Mika Käki, Natalie Jhaveri
122
Voted
OSDI
2004
ACM
16 years 2 months ago
Automated Worm Fingerprinting
Network worms are a clear and growing threat to the security of today's Internet-connected hosts and networks. The combination of the Internet's unrestricted connectivit...
Sumeet Singh, Cristian Estan, George Varghese, Ste...
WETICE
2009
IEEE
15 years 9 months ago
Cloud Computing and the Lessons from the Past
— The skyrocketing demand for a new generation of cloud-based consumer and business applications is driving the need for next generation of datacenters that must be massively sca...
Rao Mikkilineni, Vijay Sarathy
COLCOM
2007
IEEE
15 years 8 months ago
Cooperative security in distributed sensor networks
— Distributed sensor network protocols, such as routing, time synchronization or data aggregation protocols make use of collaborative techniques to minimize the consumption of sc...
Oscar García Morchon, Heribert Baldus, Tobi...