Sciweavers

1227 search results - page 148 / 246
» Remote Store Programming
Sort
View
SISW
2005
IEEE
14 years 3 months ago
Towards Protecting Sensitive Files in a Compromised System
Protecting sensitive files from a compromised system helps administrator to thwart many attacks, discover intrusion trails, and fast restore the system to a safe state. However, ...
Xin Zhao, Kevin Borders, Atul Prakash
BTW
2005
Springer
142views Database» more  BTW 2005»
14 years 3 months ago
Self-Extending Peer Data Management
Abstract: Peer data management systems (PDMS) are the natural extension of integrated information systems. Conventionally, a single integrating system manages an integrated schema,...
Ralf Heese, Sven Herschel, Felix Naumann, Armin Ro...
CIKM
2004
Springer
14 years 3 months ago
Local methods for estimating pagerank values
The Google search engine uses a method called PageRank, together with term-based and other ranking techniques, to order search results returned to the user. PageRank uses link ana...
Yen-Yu Chen, Qingqing Gan, Torsten Suel
JCDL
2003
ACM
231views Education» more  JCDL 2003»
14 years 3 months ago
Acquisition, Representation, Query and Analysis of Spatial Data: A Demonstration 3D Digital Library
The increasing power of techniques to model complex geometry and extract meaning from 3D information create complex data that must be described, stored, and displayed to be useful...
Jeremy Rowe, Anshuman Razdan, Arleyn Simon
ICOIN
2001
Springer
14 years 2 months ago
A Proxy Caching Scheme for Continuous Media Streams on the Internet
The Internet has enabled the dissemination and access of vast amounts of information to be easy. But dramatic increases of the number of users of Internet cause server overload, n...
Eun-Ji Lim, Seong-Ho Park, Hyeon-Ok Hong, Ki-Dong ...