Sciweavers

2036 search results - page 130 / 408
» Using and Abusing XML
Sort
View
ICDE
2009
IEEE
114views Database» more  ICDE 2009»
16 years 4 months ago
XOntoRank: Ontology-Aware Search of Electronic Medical Records
As the use of Electronic Medical Records (EMRs) becomes more widespread, so does the need for effective information discovery within them. Recently proposed EMR standards are XML-b...
Fernando Farfán, Vagelis Hristidis, Anand R...
128
Voted
P2P
2007
IEEE
132views Communications» more  P2P 2007»
15 years 9 months ago
The Design and Evaluation of Techniques for Route Diversity in Distributed Hash Tables
To achieve higher efficiency over their unstructured counterparts, structured peer-to-peer systems hold each node responsible for serving a specified set of keys and correctly r...
Cyrus Harvesf, Douglas M. Blough
132
Voted
ICCS
2007
Springer
15 years 8 months ago
DDDAS/ITR: A Data Mining and Exploration Middleware for Grid and Distributed Computing
We describe our project that marries data mining together with Grid computing. Specifically, we focus on one data mining application - the Minnesota Intrusion Detection System (MIN...
Jon B. Weissman, Vipin Kumar, Varun Chandola, Eric...
103
Voted
SIGOPSE
2004
ACM
15 years 8 months ago
Trust but verify: accountability for network services
This paper promotes accountability as a central design goal for dependable networked systems. We define three properties for accountable systems that extend beyond the basic secu...
Aydan R. Yumerefendi, Jeffrey S. Chase
111
Voted
SMI
2003
IEEE
131views Image Analysis» more  SMI 2003»
15 years 8 months ago
Watermarking 2D Vector Maps in the Mesh-Spectral Domain
This paper proposes a digital watermarking algorithm for 2D vector digital maps. The watermark is a robust, informed-detection watermark to be used to prevent such abuses as an in...
Ryutarou Ohbuchi, Hiroo Ueda, Shuh Endoh