Sciweavers

1587 search results - page 314 / 318
» System Support for Partition-Aware Network Applications
Sort
View
BMCBI
2008
83views more  BMCBI 2008»
13 years 11 months ago
Terminologies for text-mining; an experiment in the lipoprotein metabolism domain
Background: The engineering of ontologies, especially with a view to a text-mining use, is still a new research field. There does not yet exist a well-defined theory and technolog...
Dimitra Alexopoulou, Thomas Wächter, Laura Pi...
SAGA
2007
Springer
14 years 5 months ago
Probabilistic Techniques in Algorithmic Game Theory
We consider applications of probabilistic techniques in the framework of algorithmic game theory. We focus on three distinct case studies: (i) The exploitation of the probabilistic...
Spyros C. Kontogiannis, Paul G. Spirakis
CCS
2007
ACM
14 years 5 months ago
Memsherlock: an automated debugger for unknown memory corruption vulnerabilities
Software vulnerabilities have been the main contributing factor to the Internet security problems such as fast spreading worms. Among these software vulnerabilities, memory corrup...
Emre Can Sezer, Peng Ning, Chongkyung Kil, Jun Xu
RTAS
1997
IEEE
14 years 3 months ago
Scalable Hardware Priority Queue Architectures for High-Speed Packet Switches
ÐWith effective packet-scheduling mechanisms, modern integrated networks can support the diverse quality-of-service requirements of emerging applications. However, arbitrating bet...
Sung-Whan Moon, Kang G. Shin, Jennifer Rexford
SIGMOD
1997
ACM
166views Database» more  SIGMOD 1997»
14 years 3 months ago
The InfoSleuth Project
The goal of the InfoSleuth project at MCC is to exploit and synthesize new technologies into a uni ed system that retrieves and processes information in an ever-changing network o...
Roberto J. Bayardo Jr., William Bohrer, Richard S....