Sciweavers

6844 search results - page 1263 / 1369
» Web Service Security
Sort
View
UM
2007
Springer
14 years 5 months ago
Capturing User Interests by Both Exploitation and Exploration
Personalization is one of the important research issues in the areas of information retrieval and Web search. Providing personalized services that are tailored toward the specific...
Ka Cheung Sia, Shenghuo Zhu, Yun Chi, Koji Hino, B...
VLDB
2007
ACM
135views Database» more  VLDB 2007»
14 years 5 months ago
DAMIA - A Data Mashup Fabric for Intranet Applications
Damia is a lightweight enterprise data integration service where line of business users can create and catalog high value data feeds for consumption by situational applications. D...
Mehmet Altinel, Paul Brown, Susan Cline, Rajesh Ka...
INFOCOM
2006
IEEE
14 years 5 months ago
DDoS-Resilient Scheduling to Counter Application Layer Attacks Under Imperfect Detection
— Countering Distributed Denial of Service (DDoS) attacks is becoming ever more challenging with the vast resources and techniques increasingly available to attackers. In this pa...
Supranamaya Ranjan, Ram Swaminathan, Mustafa Uysal...
VTC
2006
IEEE
152views Communications» more  VTC 2006»
14 years 5 months ago
Cross-Layer Interaction Between TCP and UMTS RRM Scheduling Strategies
— In the third generation wireless system UMTS, Radio Resource Management (RRM) functions should encompass scheduling algorithms. In particular, scheduling mechanisms play a key ...
Juan Rendón, Anna Sfairopoulou, Ramon Ferr&...
CCGRID
2005
IEEE
14 years 4 months ago
A grid-based system for microbial genome comparison and analysis
Genome comparison and analysis can reveal the structures and functions of genome sequences of different species. As more genomes are sequenced, genomic data sources are rapidly in...
Yudong Sun, Anil Wipat, Matthew R. Pocock, P. A. L...
« Prev « First page 1263 / 1369 Last » Next »