Sciweavers

34181 search results - page 6749 / 6837
» The Computer System GRAPHOGRAPH
Sort
View
143
Voted
ISMB
2007
15 years 4 months ago
A Chado case study: an ontology-based modular schema for representing genome-associated biological information
Motivation: A few years ago, FlyBase undertook to design a new database schema to store Drosophila data. It would fully integrate genomic sequence and annotation data with bibliog...
Chris Mungall, David B. Emmert
131
Voted
NSDI
2007
15 years 4 months ago
A Systematic Framework for Unearthing the Missing Links: Measurements and Impact
The lack of an accurate representation of the Internet topology at the Autonomous System (AS) level is a limiting factor in the design, simulation, and modeling efforts in inter-d...
Yihua He, Georgos Siganos, Michalis Faloutsos, Sri...
NSDI
2007
15 years 4 months ago
WiLDNet: Design and Implementation of High Performance WiFi Based Long Distance Networks
WiFi-based Long Distance (WiLD) networks with links as long as 50–100 km have the potential to provide connectivity at substantially lower costs than traditional approaches. How...
Rabin K. Patra, Sergiu Nedevschi, Sonesh Surana, A...
106
Voted
NSDI
2008
15 years 4 months ago
Studying Black Holes in the Internet with Hubble
We present Hubble, a system that operates continuously to find Internet reachability problems in which routes exist to a destination but packets are unable to reach the destinatio...
Ethan Katz-Bassett, Harsha V. Madhyastha, John P. ...
128
Voted
NSDI
2008
15 years 4 months ago
Designing and Implementing Malicious Hardware
Hidden malicious circuits provide an attacker with a stealthy attack vector. As they occupy a layer below the entire software stack, malicious circuits can bypass traditional defe...
Samuel T. King, Joseph Tucek, Anthony Cozzie, Chri...
« Prev « First page 6749 / 6837 Last » Next »