Sciweavers

170 search results - page 27 / 34
» Reorganizing Web Sites Based on User Access Patterns
Sort
View
WSE
2002
IEEE
14 years 13 days ago
Laying the Foundation for Web Services over Legacy Systems
As the use of the World Wide Web becomes more pervasive within our society, businesses and institutions are required to migrate a wide range of services to the web. Difficulties a...
Janet Lavery, Cornelia Boldyreff, Bin Ling, Colin ...
CORR
2010
Springer
155views Education» more  CORR 2010»
13 years 7 months ago
Data-driven Co-clustering Model of Internet Usage in Large Mobile Societies
Design and simulation of future mobile networks will center around human interests and behavior. We propose a design paradigm for mobile networks driven by realistic models of use...
Saeed Moghaddam, Ahmed Helmy, Sanjay Ranka, Manas ...
NSDI
2008
13 years 10 months ago
Ostra: Leveraging Trust to Thwart Unwanted Communication
Online communication media such as email, instant messaging, bulletin boards, voice-over-IP, and social networking sites allow any sender to reach potentially millions of users at...
Alan Mislove, Ansley Post, Peter Druschel, P. Kris...
BMCBI
2002
109views more  BMCBI 2002»
13 years 7 months ago
Kangaroo - A pattern-matching program for biological sequences
Background: Biologists are often interested in performing a simple database search to identify proteins or genes that contain a well-defined sequence pattern. Many databases do no...
Doron Betel, Christopher W. V. Hogue
RV
2007
Springer
151views Hardware» more  RV 2007»
14 years 1 months ago
Instrumentation of Open-Source Software for Intrusion Detection
A significant number of cyber assaults are attempted against open source internet support software written in C, C++, or Java. Examples of these software packages include the Apac...
William R. Mahoney, William L. Sousan