Sciweavers

231 search results - page 43 / 47
» Working set-based access control for network file systems
Sort
View
CBMS
2007
IEEE
14 years 3 months ago
A Large Scale Data Mining Approach to Antibiotic Resistance Surveillance
One of the most considerable functions in a hospital's infection control program is the surveillance of antibiotic resistance. Several traditional methods used to measure it ...
Eugenia G. Giannopoulou, Vasileios P. Kemerlis, Mi...
HICSS
2003
IEEE
178views Biometrics» more  HICSS 2003»
14 years 1 months ago
A Contract and Rights Management Framework Design for Interacting Brokers
Contract and rights management – and thus property rights protection – has gained increasing importance as a quality standard in brokerage and electronic commerce environments...
Susanne Guth, Bernd Simon, Uwe Zdun
AIPS
2003
13 years 10 months ago
The Role of Planning in Grid Computing
Grid computing gives users access to widely distributed networks of computing resources to solve large-scale tasks such as scientific computation. These tasks are defined as stand...
Jim Blythe, Ewa Deelman, Yolanda Gil, Carl Kesselm...
IMC
2006
ACM
14 years 2 months ago
Malware prevalence in the KaZaA file-sharing network
In recent years, more than 200 viruses have been reported to use a peer-to-peer (P2P) file-sharing network as a propagation vector. Disguised as files that are frequently exchan...
Seungwon Shin, Jaeyeon Jung, Hari Balakrishnan
SIGMOD
2010
ACM
324views Database» more  SIGMOD 2010»
14 years 1 months ago
Similarity search and locality sensitive hashing using ternary content addressable memories
Similarity search methods are widely used as kernels in various data mining and machine learning applications including those in computational biology, web search/clustering. Near...
Rajendra Shinde, Ashish Goel, Pankaj Gupta, Debojy...