Sciweavers

24188 search results - page 4786 / 4838
» Computing on Encrypted Data
Sort
View
CORR
2008
Springer
152views Education» more  CORR 2008»
14 years 10 months ago
Characterizing User Mobility in Second Life
In this work we present a measurement study of user mobility in Second Life. We first discuss different techniques to collect user traces and then focus on results obtained using ...
Chi-Anh La, Pietro Michiardi
CORR
2008
Springer
141views Education» more  CORR 2008»
14 years 10 months ago
Model checking memoryful linear-time logics over one-counter automata
We study complexity of the model-checking problems for LTL with registers (also known as freeze LTL and written LTL ) and for first-order logic with data equality tests (written F...
Stéphane Demri, Ranko Lazic, Arnaud Sangnie...
CSCW
2008
ACM
14 years 10 months ago
Context-linked virtual assistants for distributed teams: an astrophysics case study
There is a growing need for distributed teams to analyze complex and dynamic data streams and make critical decisions under time pressure. Via a case study, we discuss potential g...
Sarah S. Poon, Rollin C. Thomas, Cecilia R. Aragon...
DEBU
2008
149views more  DEBU 2008»
14 years 10 months ago
Semantics enhanced Services: METEOR-S, SAWSDL and SA-REST
Services Research Lab at the Knoesis center and the LSDIS lab at University of Georgia have played a significant role in advancing the state of research in the areas of workflow m...
Amit P. Sheth, Karthik Gomadam, Ajith Ranabahu
AAMAS
2006
Springer
14 years 10 months ago
CONFIDANT: Collaborative Object Notification Framework for Insider Defense using Autonomous Network Transactions
File Integrity Analyzers serve as a component of an Intrusion Detection environment by performing filesystem inspections to verify the content of security-critical files in order ...
Adam J. Rocke, Ronald F. DeMara
« Prev « First page 4786 / 4838 Last » Next »