Sciweavers

2250 search results - page 161 / 450
» Authorizing applications in singularity
Sort
View
101
Voted
SAC
2008
ACM
14 years 8 months ago
Profile based comparative analysis for AOSE methodologies evaluation
This study focuses on the analysis and evaluation of agentoriented methodologies. Different studies have been proposed for the evaluation of agent-oriented methodologies adopting ...
Luca Cernuzzi, Franco Zambonelli
WWW
2009
ACM
15 years 11 months ago
A geographical analysis of knowledge production in computer science
We analyze knowledge production in Computer Science by means of coauthorship networks. For this, we consider 30 graduate programs of different regions of the world, being 8 progra...
Alberto H. F. Laender, Guilherme Vale Menezes, Niv...
81
Voted
WWW
2003
ACM
15 years 11 months ago
Evolving the Semantic Web with Mangrove
Despite numerous proposals for its creation, the semantic web has yet to achieve widespread adoption. Recently, some researchers have argued that participation in the semantic web...
Luke McDowell, Oren Etzioni, Steven D. Gribble, Al...
99
Voted
FC
2007
Springer
158views Cryptology» more  FC 2007»
15 years 4 months ago
Hidden Identity-Based Signatures
This paper introduces Hidden Identity-based Signatures (Hidden-IBS), a type of digital signatures that provide mediated signer-anonymity on top of Shamir’s Identity-based signat...
Aggelos Kiayias, Hong-Sheng Zhou
89
Voted
ECOOP
2005
Springer
15 years 3 months ago
Interprocedural Analysis for Privileged Code Placement and Tainted Variable Detection
In Java 2 and Microsoft .NET Common Language Runtime (CLR), trusted code has often been programmed to perform accessrestricted operations not explicitly requested by its untrusted ...
Marco Pistoia, Robert J. Flynn, Larry Koved, Vugra...