Sciweavers

859 search results - page 165 / 172
» Security for Key Management Interfaces
Sort
View
PVG
2003
IEEE
138views Visualization» more  PVG 2003»
14 years 3 months ago
Sort-First, Distributed Memory Parallel Visualization and Rendering
While commodity computing and graphics hardware has increased in capacity and dropped in cost, it is still quite difficult to make effective use of such systems for general-purpos...
E. Wes Bethel, Greg Humphreys, Brian E. Paul, J. D...
BMCBI
2006
102views more  BMCBI 2006»
13 years 9 months ago
MycoperonDB: a database of computationally identified operons and transcriptional units in Mycobacteria
Background: A key post genomics challenge is to identify how genes in an organism come together and perform physiological functions. An important first step in this direction is t...
Sarita Ranjan, Ranjit Kumar Gundu, Akash Ranjan
INFOSCALE
2009
ACM
14 years 4 months ago
A Lightweight Mechanism to Mitigate Application Layer DDoS Attacks
Abstract. Application layer DDoS attacks, to which network layer solutions is not applicable as attackers are indistinguishable based on packets or protocols, prevent legitimate us...
Jie Yu, Chengfang Fang, Liming Lu, Zhoujun Li
WWW
2005
ACM
14 years 10 months ago
Web-assisted annotation, semantic indexing and search of television and radio news
The Rich News system, that can automatically annotate radio and television news with the aid of resources retrieved from the World Wide Web, is described. Automatic speech recogni...
Mike Dowman, Valentin Tablan, Hamish Cunningham, B...
GROUP
2009
ACM
14 years 2 months ago
Musical fingerprints: collaboration around home media collections
As people collect more and more digital music, photos, and video, the growing scale of the collection challenges how families share and collaborate around home media collections. ...
Robin Sease, David W. McDonald