Sciweavers

2726 search results - page 504 / 546
» Application security support in the operating system kernel
Sort
View
KDD
2009
ACM
232views Data Mining» more  KDD 2009»
15 years 10 months ago
Classification of software behaviors for failure detection: a discriminative pattern mining approach
Software is a ubiquitous component of our daily life. We often depend on the correct working of software systems. Due to the difficulty and complexity of software systems, bugs an...
David Lo, Hong Cheng, Jiawei Han, Siau-Cheng Khoo,...
PVLDB
2010
342views more  PVLDB 2010»
14 years 8 months ago
CRIUS: User-Friendly Database Design
Non-technical users are increasingly adding structures to their data. This gives rise to the need for database design. However, traditional database design is deliberate and heavy...
Li Qian, Kristen LeFevre, H. V. Jagadish
NSPW
1998
ACM
15 years 1 months ago
Meta Objects for Access Control: a Formal Model for Role-Based Principals
Object-based programming is becoming more and more popular and is currently conquering the world of distributed programming models. In object-based systems access control is often...
Thomas Riechmann, Franz J. Hauck
MOBISYS
2007
ACM
15 years 9 months ago
Experiences of designing and deploying intelligent sensor nodes to monitor hand-arm vibrations in the field
The NEMO project is exploring the use of mobile sensor nodes to augment physical work artefacts in order to ensure compliance with health and safety regulations. In this paper we ...
Christos Efstratiou, Nigel Davies, Gerd Kortuem, J...
EUROSYS
2007
ACM
15 years 6 months ago
Concierge: a service platform for resource-constrained devices
As mobile and embedded devices become widespread, the management and configuration of the software in the devices is increasingly turning into a critical issue. OSGi is a busines...
Jan S. Rellermeyer, Gustavo Alonso