Sciweavers

1989 search results - page 360 / 398
» Integrity Management in Component Based Systems
Sort
View
SIGMOD
2007
ACM
176views Database» more  SIGMOD 2007»
16 years 1 months ago
URank: formulation and efficient evaluation of top-k queries in uncertain databases
Top-k processing in uncertain databases is semantically and computationally different from traditional top-k processing. The interplay between query scores and data uncertainty ma...
Mohamed A. Soliman, Ihab F. Ilyas, Kevin Chen-Chua...
ICIW
2009
IEEE
15 years 8 months ago
Personalized News Search in WWW: Adapting on User's Behavior
— Personalized Web Search becomes nowadays a promising option in the field of Information Retrieval and search engines design by improving both output quality and user experience...
Christos Bouras, Vassilis Poulopoulos, Panagiotis ...
MHCI
2009
Springer
15 years 8 months ago
A context-sensitive security model for privacy protection on mobile phones
In this paper we present a context-sensitive security model for privacy protection on mobile phones. We describe the system TreasurePhone which implements this security model. The...
Julian Seifert, Alexander De Luca, Bettina Conradi
116
Voted
ICCCN
2008
IEEE
15 years 8 months ago
Policy Distribution Methods for Function Parallel Firewalls
—Parallel firewalls offer a scalable low latency design for inspecting packets at high speeds. Typically consisting of an array of m firewalls, these systems filter arriving p...
Michael R. Horvath, Errin W. Fulp, Patrick Wheeler
QEST
2006
IEEE
15 years 7 months ago
Compositional Performability Evaluation for STATEMATE
Abstract— This paper reports on our efforts to link an industrial state-of-the-art modelling tool to academic state-of-the-art analysis algorithms. In a nutshell, we enable timed...
Eckard Böde, Marc Herbstritt, Holger Hermanns...