Sciweavers

577 search results - page 65 / 116
» Engineering Sufficiently Secure Computing
Sort
View
SAC
2008
ACM
15 years 2 months ago
A lifecycle approach to SOA governance
Due to the distributed nature of Service-Oriented Architectures (SOA), maintaining control in a SOA environment becomes more difficult as services spread over different lines-of-b...
T. G. J. Schepers, Maria-Eugenia Iacob, Pascal van...
TASLP
2010
124views more  TASLP 2010»
14 years 9 months ago
Audio Signal Representations for Indexing in the Transform Domain
Indexing audio signals directly in the transform domain can potentially save a significant amount of computation when working on a large database of signals stored in a lossy compr...
Emmanuel Ravelli, Gaël Richard, Laurent Daude...
DSOM
2004
Springer
15 years 8 months ago
Autonomous Management of Clustered Server Systems Using JINI
Abstract. A framework for the autonomous management of clustered server systems called LAMA1 (Large-scale system’s Autonomous Management Agent) is proposed in this paper. LAMA is...
Chul Lee, Seung Ho Lim, Sang Seok Lim, Kyu Ho Park
SAC
2009
ACM
15 years 9 months ago
Remote software protection by orthogonal client replacement
In a typical client-server scenario, a trusted server provides valuable services to a client, which runs remotely on an untrusted platform. Of the many security vulnerabilities th...
Mariano Ceccato, Paolo Tonella, Mila Dalla Preda, ...
KDD
2009
ACM
269views Data Mining» more  KDD 2009»
16 years 3 months ago
Extracting discriminative concepts for domain adaptation in text mining
One common predictive modeling challenge occurs in text mining problems is that the training data and the operational (testing) data are drawn from different underlying distributi...
Bo Chen, Wai Lam, Ivor Tsang, Tak-Lam Wong