Sciweavers

96 search results - page 18 / 20
» hicss 2010
Sort
View
HICSS
2010
IEEE
216views Biometrics» more  HICSS 2010»
13 years 11 months ago
A Virtualization Architecture for In-Depth Kernel Isolation
Recent advances in virtualization technologies have sparked a renewed interest in the use of kernel and process virtualization as a security mechanism to enforce resource isolatio...
Jiang Wang, Sameer Niphadkar, Angelos Stavrou, Anu...
HICSS
2010
IEEE
154views Biometrics» more  HICSS 2010»
13 years 7 months ago
On Mapping Business Document Models to Core Components
Today, there exists a huge variety of business document models for electronic data exchange among business partners used in business-to-business, business-to-government, as well a...
Michael Strommer, Christian Pichler, Philipp Liegl
HICSS
2010
IEEE
147views Biometrics» more  HICSS 2010»
13 years 6 months ago
Understanding the Adoption of Electronic Banking in China
Electronic banking (e-banking), facilitated by various Electronic Commerce (EC) technologies, has helped commercial banks to stay competitive through productivity gains, transacti...
Sherah Kurnia, Fei Peng, Yi Ruo Liu
HICSS
2010
IEEE
200views Biometrics» more  HICSS 2010»
13 years 7 months ago
Instability of Relevance-Ranked Results Using Latent Semantic Indexing for Web Search
1 The latent semantic indexing (LSI) methodology for information retrieval applies the singular value decomposition to identify an eigensystem for a large matrix, in which cells re...
Houssain Kettani, Gregory B. Newby
HICSS
2010
IEEE
185views Biometrics» more  HICSS 2010»
14 years 20 days ago
Concurrent Architecture for Automated Malware Classification
This paper introduces a new architecture for automating the generalization of program structure and the recognition of common patterns in the area of malware analysis. By using ma...
Timothy Daly, Luanne Burns