Sciweavers

23557 search results - page 4217 / 4712
» Distributed Computing - Introduction
Sort
View
161
Voted
ACSAC
1999
IEEE
15 years 9 months ago
Adding Availability to Log Services of Untrusted Machines
Uncorrupted log files are the critical system component for computer forensics in case of intrusion and for real time system monitoring and auditing. Protection from tampering wit...
Arianna Arona, Danilo Bruschi, Emilia Rosti
HICSS
1999
IEEE
106views Biometrics» more  HICSS 1999»
15 years 9 months ago
Automating the Interoperation of Information Processing Tools
This paper describes an agent-based architecture designed to support the interoperation of distributed and disparate information processing tools and resources. This work is based...
Stephen Cranefield, Emanuela Moreale, Bryce McKinl...
HOTOS
1999
IEEE
15 years 9 months ago
Xenoservers: Accountable Execution of Untrusted Programs
Many networked applications could benefit from executing closer to the data or services with which they interact. By doing this they may be able to circumvent long communication l...
Dickon Reed, Ian Pratt, Paul Menage, Stephen Early...
ADBIS
1999
Springer
104views Database» more  ADBIS 1999»
15 years 9 months ago
Arbiter Meta-Learning with Dynamic Selection of Classifiers and Its Experimental Investigation
In data mining, the selection of an appropriate classifier to estimate the value of an unknown attribute for a new instance has an essential impact to the quality of the classifica...
Alexey Tsymbal, Seppo Puuronen, Vagan Y. Terziyan
129
Voted
CIKM
1999
Springer
15 years 9 months ago
Indexing and Retrieval of Scientific Literature
The web hasgreatly improved accessto scientific literature. However, scientific articles on the web are largely disorganized, with research articles being spreadacrossarchive site...
Steve Lawrence, Kurt D. Bollacker, C. Lee Giles
« Prev « First page 4217 / 4712 Last » Next »