Sciweavers

8493 search results - page 1590 / 1699
» Implementing a distributed firewall
Sort
View
147
Voted
SAS
2007
Springer
108views Formal Methods» more  SAS 2007»
15 years 9 months ago
Programming Language Design and Analysis Motivated by Hardware Evolution
Abstract. Silicon chip design has passed a threshold whereby exponentially increasing transistor density (Moore’s Law) no longer translates into increased processing power for si...
Alan Mycroft
SEMWEB
2007
Springer
15 years 9 months ago
Cultural Adaptivity for the Semantic Web
Our research explores the possibilities for factoring culture into user models, working towards cultural adaptivity in the semantic web. The aim is to represent the user’s positi...
Katharina Reinecke
SEMWEB
2007
Springer
15 years 9 months ago
Using the AgreementMaker to Align Ontologies for the OAEI Campaign 2007
In this paper, we present the AgreementMaker, an ontology alignment tool that incorporates the Descendants Similarity Inheritance (DSI) method. This method uses the structure of th...
William Sunna, Isabel F. Cruz
132
Voted
TGC
2007
Springer
15 years 9 months ago
Logical Networks: Towards Foundations for Programmable Overlay Networks and Overlay Computing Systems
Abstract. We propose and discuss foundations for programmable overlay networks and overlay computing systems. Such overlays are built over a large number of distributed computation...
Luigi Liquori, Michel Cosnard
127
Voted
ACSAC
2006
IEEE
15 years 9 months ago
How to Automatically and Accurately Sandbox Microsoft IIS
Comparing the system call sequence of a network application against a sandboxing policy is a popular approach to detecting control-hijacking attack, in which the attacker exploits...
Wei Li, Lap-Chung Lam, Tzi-cker Chiueh
« Prev « First page 1590 / 1699 Last » Next »