Sciweavers

511 search results - page 95 / 103
» Adding Security to Compressed Information Retrieval Systems
Sort
View
129
Voted
CCS
2010
ACM
15 years 3 months ago
HyperSentry: enabling stealthy in-context measurement of hypervisor integrity
This paper presents HyperSentry, a novel framework to enable integrity measurement of a running hypervisor (or any other highest privileged software layer on a system). Unlike exi...
Ahmed M. Azab, Peng Ning, Zhi Wang, Xuxian Jiang, ...
135
Voted
JCDL
2004
ACM
175views Education» more  JCDL 2004»
15 years 9 months ago
Supporting personal collections across digital libraries in spatial hypertext
Creating, maintaining, or using a digital library requires the manipulation of digital documents. Information workspaces provide a visual representation allowing users to collect,...
Frank M. Shipman III, Hao-wei Hsieh, J. Michael Mo...
217
Voted
BMCBI
2005
102views more  BMCBI 2005»
15 years 3 months ago
BioCreAtIvE Task1A: entity identification with a stochastic tagger
Background: Our approach to Task 1A was inspired by Tanabe and Wilbur's ABGene system [1,2]. Like Tanabe and Wilbur, we approached the problem as one of part-of-speech taggin...
Shuhei Kinoshita, K. Bretonnel Cohen, Philip V. Og...
IPPS
2008
IEEE
15 years 10 months ago
Multi-threaded data mining of EDGAR CIKs (Central Index Keys) from ticker symbols
This paper describes how use the Java Swing HTMLEditorKit to perform multi-threaded web data mining on the EDGAR system (Electronic DataGathering, Analysis, and Retrieval system)....
Dougal A. Lyon
97
Voted
JSAC
2007
93views more  JSAC 2007»
15 years 3 months ago
Eviction of Misbehaving and Faulty Nodes in Vehicular Networks
— Vehicular Networks (VNs) are emerging, among civilian applications, as a convincing instantiation of the mobile networking technology. However, security is a critical factor an...
Maxim Raya, Panagiotis Papadimitratos, Imad Aad, D...