Sciweavers

51 search results - page 4 / 11
» Data Access in a Cyber World: Making Use of Cyberinfrastruct...
Sort
View
WEBNET
1997
13 years 7 months ago
Easy Ed: An Integration of Technologies for Multimedia Education
–The accessibility of the World Wide Web and its flexibility for conveying digital information in various forms makes it a convenient mode of communication for education. In thi...
Gulrukh Ahanger, Thomas D. C. Little
WWW
2010
ACM
14 years 24 days ago
Distributing private data in challenged network environments
Developing countries face significant challenges in network access, making even simple network tasks unpleasant. Many standard techniques—caching and predictive prefetching— ...
Azarias Reda, Brian D. Noble, Yidnekachew Haile
RR
2010
Springer
13 years 4 months ago
Query-Based Access Control for Ontologies
Role-based access control is a standard mechanism in information systems. Based on the role a user has, certain information is kept from the user even if requested. For ontologies ...
Martin Knechtel, Heiner Stuckenschmidt
FLAIRS
2007
13 years 8 months ago
Finding Data, Knowledge, and Answers on the Semantic Web
Web search engines like Google have made us all smarter by providing ready access to the world's knowledge whenever we need to look up a fact, learn about a topic or evaluate...
Timothy W. Finin, Joel Sachs, Cynthia Sims Parr
DIMVA
2010
13 years 7 months ago
HookScout: Proactive Binary-Centric Hook Detection
Abstract. In order to obtain and maintain control, kernel malware usually makes persistent control flow modifications (i.e., installing hooks). To avoid detection, malware develope...
Heng Yin, Pongsin Poosankam, Steve Hanna, Dawn Xia...