Sciweavers

554 search results - page 95 / 111
» Analysing Requirements for Content Management
Sort
View
CGO
2010
IEEE
15 years 4 months ago
An efficient software transactional memory using commit-time invalidation
To improve the performance of transactional memory (TM), researchers have found many eager and lazy optimizations for conflict detection, the process of determining if transaction...
Justin Emile Gottschlich, Manish Vachharajani, Jer...
CCS
2006
ACM
15 years 3 months ago
Secure information sharing enabled by Trusted Computing and PEI models
The central goal of secure information sharing is to "share but protect" where the motivation to "protect" is to safeguard the sensitive content from unauthori...
Ravi S. Sandhu, Kumar Ranganathan, Xinwen Zhang
CRYPTO
1987
Springer
87views Cryptology» more  CRYPTO 1987»
15 years 3 months ago
How to Make Replicated Data Secure
Many distributed systems manage some form of long-lived data, such as files or data bases. The performance and fault-tolerance of such systems may be enhanced if the repositories ...
Maurice Herlihy, J. D. Tygar
KDD
2010
ACM
323views Data Mining» more  KDD 2010»
15 years 1 months ago
TIARA: a visual exploratory text analytic system
In this paper, we present a novel exploratory visual analytic system called TIARA (Text Insight via Automated Responsive Analytics), which combines text analytics and interactive ...
Furu Wei, Shixia Liu, Yangqiu Song, Shimei Pan, Mi...
CIKM
2008
Springer
15 years 1 months ago
Predicting web spam with HTTP session information
Web spam is a widely-recognized threat to the quality and security of the Web. Web spam pages pollute search engine indexes, burden Web crawlers and Web mining services, and expos...
Steve Webb, James Caverlee, Calton Pu