Sciweavers

2830 search results - page 403 / 566
» No Science without Semantics
Sort
View
144
Voted
ESORICS
2000
Springer
15 years 7 months ago
Using Reflection as a Mechanism for Enforcing Security Policies in Mobile Code
Several authors have proposed using code modification as a technique for enforcing security policies such as resource limits, access controls, and network information flows. Howeve...
Ian Welch, Robert J. Stroud
162
Voted
MA
2000
Springer
135views Communications» more  MA 2000»
15 years 7 months ago
Principles of Mobile Maude
Mobile Maude is a mobile agent language extending the rewriting logic language Maude and supporting mobile computation. Mobile Maude uses reflection to obtain a simple and general ...
Francisco Durán, Steven Eker, Patrick Linco...
149
Voted
CICLING
2010
Springer
15 years 7 months ago
ETL Ensembles for Chunking, NER and SRL
We present a new ensemble method that uses Entropy Guided Transformation Learning (ETL) as the base learner. The proposed approach, ETL Committee, combines the main ideas of Baggin...
Cícero Nogueira dos Santos, Ruy Luiz Milidi...
113
Voted
BTW
2009
Springer
128views Database» more  BTW 2009»
15 years 7 months ago
Stream-Based Web Service Invocation
: Service-oriented architectures (SOA) based on Web service technology play an increasingly important role in many different application areas. The current service invocation metho...
Steffen Preissler, Hannes Voigt, Dirk Habich, Wolf...
136
Voted
MOBISYS
2010
ACM
15 years 6 months ago
Docx2Go: collaborative editing of fidelity reduced documents on mobile devices
Docx2Go is a new framework to support editing of shared documents on mobile devices. Three high-level requirements influenced its design -- namely, the need to adapt content, espe...
Krishna P. N. Puttaswamy, Catherine C. Marshall, V...