Sciweavers

3688 search results - page 705 / 738
» Requirements of Phylogenetic Databases
Sort
View
CLUSTER
2005
IEEE
14 years 2 months ago
Fast Query Processing by Distributing an Index over CPU Caches
Data intensive applications on clusters often require requests quickly be sent to the node managing the desired data. In many applications, one must look through a sorted tree str...
Xiaoqin Ma, Gene Cooperman
ICDCS
2005
IEEE
14 years 2 months ago
Flexible Consistency for Wide Area Peer Replication
The lack of a flexible consistency management solution hinders P2P implementation of applications involving updates, such as read-write file sharing, directory services, online ...
Sai Susarla, John B. Carter
ISCA
2005
IEEE
134views Hardware» more  ISCA 2005»
14 years 2 months ago
A High Throughput String Matching Architecture for Intrusion Detection and Prevention
Network Intrusion Detection and Prevention Systems have emerged as one of the most effective ways of providing security to those connected to the network, and at the heart of alm...
Lin Tan, Timothy Sherwood
MOBIDE
2005
ACM
14 years 2 months ago
Recovery of mobile internet transactions: algorithm, implementation and analysis
The increasing popularity of mobile devices and the support of web portals towards performing transactions from these mobile devices has enabled business on the move. However, int...
Shashi Anand, Krithi Ramamritham
AVBPA
2005
Springer
312views Biometrics» more  AVBPA 2005»
14 years 2 months ago
Securing Electronic Medical Records Using Biometric Authentication
Abstract. Ensuring the security of medical records is becoming an increasingly important problem as modern technology is integrated into existing medical services. As a consequence...
Stephen Krawczyk, Anil K. Jain