Sciweavers

1581 search results - page 192 / 317
» Domain semantics of possibility computations
Sort
View
93
Voted
AMR
2007
Springer
167views Multimedia» more  AMR 2007»
15 years 7 months ago
Ontology: Use and Abuse
This paper is a critical analysis of the use of ontology as an instrument to specify the semantics of a document. The paper argue that not only is a logic of the type used in ontol...
Simone Santini
103
Voted
CONCURRENCY
2008
142views more  CONCURRENCY 2008»
15 years 25 days ago
Provenance trails in the Wings/Pegasus system
Our research focuses on creating and executing large-scale scientific workflows that often involve thousands of computations over distributed, shared resources. We describe an app...
Jihie Kim, Ewa Deelman, Yolanda Gil, Gaurang Mehta...
ECOWS
2007
Springer
15 years 7 months ago
Composing Services with JOLIE
Service composition and service statefulness are key concepts in Web Service system programming. In this paper we present JOLIE, which is the full implementation of our formal cal...
Fabrizio Montesi, Claudio Guidi, Gianluigi Zavatta...
104
Voted
SOUPS
2006
ACM
15 years 6 months ago
Decision strategies and susceptibility to phishing
Phishing emails are semantic attacks that con people into divulging sensitive information using techniques to make the user believe that information is being requested by a legiti...
Julie S. Downs, Mandy B. Holbrook, Lorrie Faith Cr...
ASPLOS
2004
ACM
15 years 6 months ago
Scalable selective re-execution for EDGE architectures
Pipeline flushes are becoming increasingly expensive in modern microprocessors with large instruction windows and deep pipelines. Selective re-execution is a technique that can r...
Rajagopalan Desikan, Simha Sethumadhavan, Doug Bur...