Sciweavers

2658 search results - page 456 / 532
» Micro-communication Element System
Sort
View
125
Voted
EDBT
2006
ACM
177views Database» more  EDBT 2006»
16 years 3 months ago
Authorization-Transparent Access Control for XML Under the Non-Truman Model
In authorization-transparent access control, users formulate their queries against the database schema rather than against authorization views that transform and hide data. The Tru...
Alberto O. Mendelzon, Renée J. Miller, Yaro...
132
Voted
HICSS
2010
IEEE
185views Biometrics» more  HICSS 2010»
15 years 10 months ago
Concurrent Architecture for Automated Malware Classification
This paper introduces a new architecture for automating the generalization of program structure and the recognition of common patterns in the area of malware analysis. By using ma...
Timothy Daly, Luanne Burns
139
Voted
INFOCOM
2009
IEEE
15 years 10 months ago
A Queueing Model Framework of PCE-Based Inter-Area Path Computation
Abstract—Path computation elements (PCE’s) are used to compute end-to-end paths across multiple areas. Multiple PCE’s may be dedicated to each area to provide sufficient path...
Juanjuan Yu, Yue He, Kai Wu, Marco Tacca, Andrea F...
122
Voted
ISSTA
2009
ACM
15 years 10 months ago
A comparative study of programmer-written and automatically inferred contracts
Where do contracts — specification elements embedded in executable code — come from? To produce them, should we rely on the programmers, on automatic tools, or some combinati...
Nadia Polikarpova, Ilinca Ciupa, Bertrand Meyer
141
Voted
VRML
2009
ACM
15 years 10 months ago
Extending X3D for distributed multimedia processing and control
Web-based applications of interactive 3D computer graphics are showing a tendency to get more interconnected and visually complex. Virtual communities like Second Life demand real...
Michael Repplinger, Alexander Löffler, Benjam...