Sciweavers

158 search results - page 31 / 32
» Information Leakage Detection in Distributed Systems using S...
Sort
View
BMCBI
2007
177views more  BMCBI 2007»
13 years 5 months ago
Biowep: a workflow enactment portal for bioinformatics applications
Background: The huge amount of biological information, its distribution over the Internet and the heterogeneity of available software tools makes the adoption of new data integrat...
Paolo Romano 0001, Ezio Bartocci, Guglielmo Bertol...
ACMICEC
2006
ACM
191views ECommerce» more  ACMICEC 2006»
13 years 11 months ago
An ontology of trust: formal semantics and transitivity
This paper formalizes the semantics of trust and studies the transitivity of trust. On the Web, people and software agents have to interact with “strangers”. This makes trust ...
Jingwei Huang, Mark S. Fox
LBM
2007
13 years 6 months ago
Decentralised Clinical Guidelines Modelling with Lightweight Coordination Calculus
Background: Clinical protocols and guidelines have been considered as a major means to ensure that cost-effective services are provided at the point of care. Recently, the comput...
Bo Hu, Srinandan Dasmahapatra, David Robertson, Pa...
IEEEPACT
2006
IEEE
13 years 11 months ago
Hardware support for spin management in overcommitted virtual machines
Multiprocessor operating systems (OSs) pose several unique and conflicting challenges to System Virtual Machines (System VMs). For example, most existing system VMs resort to gan...
Philip M. Wells, Koushik Chakraborty, Gurindar S. ...
CCS
2005
ACM
13 years 11 months ago
Automatic diagnosis and response to memory corruption vulnerabilities
Cyber attacks against networked computers have become relentless in recent years. The most common attack method is to exploit memory corruption vulnerabilities such as buffer ove...
Jun Xu, Peng Ning, Chongkyung Kil, Yan Zhai, Chris...