Sciweavers

977 search results - page 148 / 196
» Integrated Environment Management for Information Operations...
Sort
View
ASPLOS
2006
ACM
15 years 7 months ago
Manitou: a layer-below approach to fighting malware
Unbeknownst to many computer users, their machines are running malware. Others are aware that strange software inhabits their machine, but cannot get rid of it. In this paper, we ...
Lionel Litty, David Lie
124
Voted
SACMAT
2010
ACM
14 years 12 months ago
An architecture for enforcing end-to-end access control over web applications
The web is now being used as a general platform for hosting distributed applications like wikis, bulletin board messaging systems and collaborative editing environments. Data from...
Boniface Hicks, Sandra Rueda, Dave King 0002, Thom...
RAS
2008
149views more  RAS 2008»
15 years 1 months ago
Robot task planning using semantic maps
Task planning for mobile robots usually relies solely on spatial information and on shallow domain knowledge, like labels attached to objects and places. Although spatial informat...
Cipriano Galindo, Juan-Antonio Fernandez-Madrigal,...
SEMWEB
2009
Springer
15 years 8 months ago
DSSim Results for OAEI 2009
The growing importance of ontology mapping on the Semantic Web has highlighted the need to manage the uncertain nature of interpreting semantic meta data represented by heterogeneo...
Miklos Nagy, Maria Vargas-Vera, Piotr Stolarski
ESORICS
2008
Springer
15 years 3 months ago
A Multi-Path Approach for k-Anonymity in Mobile Hybrid Networks
The ubiquitous proliferation of mobile devices has given rise to novel user-centric application and services. In current mobile systems, users gain access to remote service provide...
Claudio Agostino Ardagna, Angelos Stavrou, Sushil ...