Sciweavers

1744 search results - page 147 / 349
» The Steganographic File System
Sort
View
116
Voted
EDBT
2008
ACM
124views Database» more  EDBT 2008»
16 years 3 months ago
Multi-dimensional search for personal information management systems
With the explosion in the amount of semi-structured data users access and store in personal information management systems, there is a need for complex search tools to retrieve of...
Amélie Marian, Christopher Peery, Thu D. Ng...
121
Voted
IPPS
2007
IEEE
15 years 10 months ago
An Approach to Detect Executable Content for Anomaly Based Network Intrusion Detection
Since current internet threats contain not only malicious codes like Trojan or worms, but also spyware and adware which do not have explicit illegal content, it is necessary to hav...
Like Zhang, Gregory B. White
127
Voted
VIP
2003
15 years 5 months ago
Screen Capture - A Vector Quantisation Approach
Over the last couple of decades, more and more presentations are done on computer screen. The need to store or broadcast such presentation efficiently is in high demand across dif...
Jesse S. Jin, Sue R. Wu
126
Voted
ICFP
2008
ACM
16 years 3 months ago
NixOS: a purely functional Linux distribution
Existing package and system configuration management tools suffer from an imperative model, where system administration actions such as upgrading packages or changes to system con...
Andres Löh, Eelco Dolstra
104
Voted
FAST
2004
15 years 5 months ago
Circus: Opportunistic Block Reordering for Scalable Content Servers
Whole-file transfer is a basic primitive for Internet content dissemination. Content servers are increasingly limited by disk arm movement given the rapid growth in disk density, ...
Stergios V. Anastasiadis, Rajiv Wickremesinghe, Je...