Sciweavers

7433 search results - page 1416 / 1487
» Management of Technology
Sort
View
EUROSYS
2008
ACM
16 years 2 months ago
Eudaemon: involuntary and on-demand emulation against zero-day exploits
Eudaemon is a technique that aims to blur the borders between protected and unprotected applications, and brings together honeypot technology and end-user intrusion detection and ...
Georgios Portokalidis, Herbert Bos
ICCD
2006
IEEE
148views Hardware» more  ICCD 2006»
16 years 2 months ago
Trends and Future Directions in Nano Structure Based Computing and Fabrication
— As silicon CMOS devices are scaled down into the nanoscale regime, new challenges at both the device and system level are arising. While some of these challenges will be overco...
R. Iris Bahar
SAC
2010
ACM
16 years 7 days ago
Web-based graphical querying of databases through an ontology: the Wonder system
Biological scientists have made large amounts of data available on the Web, which can be accessed by canned or precomputed queries presented via web forms. To satisfy further info...
Diego Calvanese, C. Maria Keet, Werner Nutt, Maria...
DASFAA
2009
IEEE
252views Database» more  DASFAA 2009»
16 years 6 days ago
Optimal Privacy-Aware Path in Hippocratic Databases
Abstract. Privacy becomes a major concern for both customers and enterprises in today’s corporate marketing strategies, many research efforts have been put into developing new p...
Min Li, Xiaoxun Sun, Hua Wang, Yanchun Zhang
HICSS
2009
IEEE
189views Biometrics» more  HICSS 2009»
16 years 6 days ago
Predicting Change: A Study of the Value Frequency Model for Change of Practice
Information systems (IS) researchers have made considerable progress on defining and formalizing structured methods to support collaborative development of information systems. Co...
Robert O. Briggs, John D. Murphy, Thomas F. Carlis...
« Prev « First page 1416 / 1487 Last » Next »