Sciweavers

2757 search results - page 470 / 552
» On separating systems
Sort
View
SIGIR
2003
ACM
15 years 9 months ago
Salton Award Lecture - Information retrieval and computer science: an evolving relationship
Following the tradition of these acceptance talks, I will be giving my thoughts on where our field is going. Any discussion of the future of information retrieval (IR) research, h...
W. Bruce Croft
LISA
2007
15 years 6 months ago
Stork: Package Management for Distributed VM Environments
In virtual machine environments each application is often run in its own virtual machine (VM), isolating it from other applications running on the same physical machine. Contentio...
Justin Cappos, Scott M. Baker, Jeremy Plichta, Duy...
ACSAC
2005
IEEE
15 years 9 months ago
Multi-Level Security Requirements for Hypervisors
Using hypervisors or virtual machine monitors for security has become very popular in recent years, and a number of proposals have been made for supporting multi-level security on...
Paul A. Karger
CSFW
2002
IEEE
15 years 9 months ago
Types and Effects for Asymmetric Cryptographic Protocols
We present the first type and effect system for proving authenticity properties of security protocols based on asymmetric cryptography. The most significant new features of our ...
Andrew D. Gordon, Alan Jeffrey
ANLP
1997
92views more  ANLP 1997»
15 years 5 months ago
CommandTalk: A Spoken-Language Interface for Battlefield Simulations
CommandTalk is a spoken-language interface to battlefield simulations that allows the use of ordinary spoken English to create forces and control measures, assign missions to forc...
Robert C. Moore, John Dowding, Harry Bratt, Jean M...