Sciweavers

840 search results - page 123 / 168
» Scalable Transfer Patterns
Sort
View
BTW
2003
Springer
103views Database» more  BTW 2003»
14 years 2 months ago
XPath-Aware Chunking of XML-Documents
Dissemination systems are used to route information received from many publishers individually to multiple subscribers. The core of a dissemination system consists of an efficient...
Wolfgang Lehner, Florian Irmert
CCS
2010
ACM
13 years 9 months ago
Dialog-based payload aggregation for intrusion detection
Network-based Intrusion Detection Systems (IDSs) such as Snort or Bro that have to analyze the packet payload for all the received data show severe performance problems if used in...
Tobias Limmer, Falko Dressler
BMCBI
2006
152views more  BMCBI 2006»
13 years 8 months ago
Amplification of the Gene Ontology annotation of Affymetrix probe sets
Background: The annotations of Affymetrix DNA microarray probe sets with Gene Ontology terms are carefully selected for correctness. This results in very accurate but incomplete a...
Enrique M. Muro, Carolina Perez-Iratxeta, Miguel A...
BMCBI
2005
99views more  BMCBI 2005»
13 years 8 months ago
CGH-Profiler: Data mining based on genomic aberration profiles
Background: CGH-Profiler is a program that supports the analysis of genomic aberrations measured by Comparative Genomic Hybridisation (CGH). Comparative genomic hybridisation (CGH...
Falk Schubert, Bernhard Tausch, Stefan Joos, Rolan...
CCS
2011
ACM
12 years 8 months ago
MIDeA: a multi-parallel intrusion detection architecture
Network intrusion detection systems are faced with the challenge of identifying diverse attacks, in extremely high speed networks. For this reason, they must operate at multi-Giga...
Giorgos Vasiliadis, Michalis Polychronakis, Sotiri...