Sciweavers

2446 search results - page 409 / 490
» First Smart Spaces
Sort
View
129
Voted
USENIX
2008
15 years 5 months ago
Vx32: Lightweight User-level Sandboxing on the x86
Code sandboxing is useful for many purposes, but most sandboxing techniques require kernel modifications, do not completely isolate guest code, or incur substantial performance co...
Bryan Ford, Russ Cox
141
Voted
BPM
2008
Springer
217views Business» more  BPM 2008»
15 years 5 months ago
Detecting Regulatory Compliance for Business Process Models through Semantic Annotations
A given business process may face a large number of regulatory obligations the process may or comply with. Providing tools and techniques through which an evaluation of the complia...
Guido Governatori, Jörg Hoffmann, Shazia Wasi...
CASES
2008
ACM
15 years 5 months ago
Multi-granularity sampling for simulating concurrent heterogeneous applications
Detailed or cycle-accurate/bit-accurate (CABA) simulation is a critical phase in the design flow of embedded systems. However, with increasing system complexity, full detailed sim...
Melhem Tawk, Khaled Z. Ibrahim, Smaïl Niar
CCS
2008
ACM
15 years 5 months ago
Authenticated hash tables
Hash tables are fundamental data structures that optimally answer membership queries. Suppose a client stores n elements in a hash table that is outsourced at a remote server so t...
Charalampos Papamanthou, Roberto Tamassia, Nikos T...
149
Voted
ELPUB
2008
ACM
15 years 5 months ago
A Semantic Web Powered Distributed Digital Library System
ResearchinHumanitiesandSocialSciencesistraditionallybasedonprintedpublicationssuchasmanuscripts, personal correspondence, first editions and other types of documents which are oft...
Michele Nucci, Michele Barbera, Christian Morbidon...