Sciweavers

2043 search results - page 395 / 409
» The Limits of Querying Ontologies
Sort
View
AINA
2008
IEEE
14 years 2 months ago
Dynamic Cache Invalidation Scheme in IR-Based Wireless Environments
Traditional cache invalidation schemes are not suitable to be employed in wireless environments due to the affections of mobility, energy consumption, and limited bandwidth. Cache ...
Yeim-Kuan Chang, Yi-Wei Ting, Tai-Hong Lin
BIBM
2008
IEEE
112views Bioinformatics» more  BIBM 2008»
14 years 2 months ago
Fast Alignments of Metabolic Networks
Network alignments are extensively used for comparing, exploring, and predicting biological networks. Existing alignment tools are mostly based on isomorphic and homeomorphic embe...
Qiong Cheng, Piotr Berman, Robert W. Harrison, Ale...
ICDCS
2008
IEEE
14 years 2 months ago
Correlation-Aware Object Placement for Multi-Object Operations
A multi-object operation incurs communication or synchronization overhead when the requested objects are distributed over different nodes. The object pair correlations (the probab...
Ming Zhong, Kai Shen, Joel I. Seiferas
ICDM
2008
IEEE
186views Data Mining» more  ICDM 2008»
14 years 2 months ago
xCrawl: A High-Recall Crawling Method for Web Mining
Web Mining Systems exploit the redundancy of data published on the Web to automatically extract information from existing web documents. The first step in the Information Extract...
Kostyantyn M. Shchekotykhin, Dietmar Jannach, Gerh...
INFOCOM
2007
IEEE
14 years 1 months ago
TriBiCa: Trie Bitmap Content Analyzer for High-Speed Network Intrusion Detection
Abstract—Deep packet inspection (DPI) is often used in network intrusion detection and prevention systems (NIDPS), where incoming packet payloads are compared against known attac...
N. Sertac Artan, H. Jonathan Chao