Sciweavers

511 search results - page 95 / 103
» Adding Security to Compressed Information Retrieval Systems
Sort
View
CCS
2010
ACM
14 years 12 months ago
HyperSentry: enabling stealthy in-context measurement of hypervisor integrity
This paper presents HyperSentry, a novel framework to enable integrity measurement of a running hypervisor (or any other highest privileged software layer on a system). Unlike exi...
Ahmed M. Azab, Peng Ning, Zhi Wang, Xuxian Jiang, ...
97
Voted
JCDL
2004
ACM
175views Education» more  JCDL 2004»
15 years 5 months ago
Supporting personal collections across digital libraries in spatial hypertext
Creating, maintaining, or using a digital library requires the manipulation of digital documents. Information workspaces provide a visual representation allowing users to collect,...
Frank M. Shipman III, Hao-wei Hsieh, J. Michael Mo...
81
Voted
BMCBI
2005
102views more  BMCBI 2005»
14 years 11 months ago
BioCreAtIvE Task1A: entity identification with a stochastic tagger
Background: Our approach to Task 1A was inspired by Tanabe and Wilbur's ABGene system [1,2]. Like Tanabe and Wilbur, we approached the problem as one of part-of-speech taggin...
Shuhei Kinoshita, K. Bretonnel Cohen, Philip V. Og...
IPPS
2008
IEEE
15 years 6 months ago
Multi-threaded data mining of EDGAR CIKs (Central Index Keys) from ticker symbols
This paper describes how use the Java Swing HTMLEditorKit to perform multi-threaded web data mining on the EDGAR system (Electronic DataGathering, Analysis, and Retrieval system)....
Dougal A. Lyon
JSAC
2007
93views more  JSAC 2007»
14 years 11 months ago
Eviction of Misbehaving and Faulty Nodes in Vehicular Networks
— Vehicular Networks (VNs) are emerging, among civilian applications, as a convincing instantiation of the mobile networking technology. However, security is a critical factor an...
Maxim Raya, Panagiotis Papadimitratos, Imad Aad, D...