Sciweavers

2830 search results - page 402 / 566
» No Science without Semantics
Sort
View
127
Voted
SP
2010
IEEE
182views Security Privacy» more  SP 2010»
15 years 7 months ago
Object Capabilities and Isolation of Untrusted Web Applications
—A growing number of current web sites combine active content (applications) from untrusted sources, as in so-called mashups. The object-capability model provides an appealing ap...
Sergio Maffeis, John C. Mitchell, Ankur Taly
128
Voted
ESORICS
2009
Springer
15 years 7 months ago
Declassification with Explicit Reference Points
Noninterference requires that public outputs of a program must be completely independent from secrets. While this ensures that secrets cannot be leaked, it is too restrictive for m...
Alexander Lux, Heiko Mantel
124
Voted
ACNS
2006
Springer
138views Cryptology» more  ACNS 2006»
15 years 7 months ago
Syntax-Driven Private Evaluation of Quantified Membership Queries
Abstract. Membership queries are basic predicate operations that apply to datasets. Quantifications of such queries express global properties between datasets, including subset inc...
Aggelos Kiayias, Antonina Mitrofanova
127
Voted
ASWC
2006
Springer
15 years 7 months ago
Minerva: A Scalable OWL Ontology Storage and Inference System
With the increasing use of ontologies in Semantic Web and enterprise knowledge management, it is critical to develop scalable and efficient ontology management systems. In this pap...
Jian Zhou, Li Ma, Qiaoling Liu, Lei Zhang, Yong Yu...
131
Voted
ADC
2003
Springer
115views Database» more  ADC 2003»
15 years 7 months ago
Document Classification via Structure Synopses
Information available in the Internet is frequently supplied simply as plain ascii text, structured according to orthographic and semantic conventions. Traditional document classi...
Liping Ma, John Shepherd, Anh Nguyen