Sciweavers

6187 search results - page 1071 / 1238
» Practical Software Measurement
Sort
View
LISA
2007
15 years 6 months ago
Secure Isolation of Untrusted Legacy Applications
Existing applications often contain security holes that are not patched until after the system has already been compromised. Even when software updates are available, applying the...
Shaya Potter, Jason Nieh, Matt Selsky
133
Voted
ASPLOS
2008
ACM
15 years 5 months ago
How low can you go?: recommendations for hardware-supported minimal TCB code execution
We explore the extent to which newly available CPU-based security technology can reduce the Trusted Computing Base (TCB) for security-sensitive applications. We find that although...
Jonathan M. McCune, Bryan Parno, Adrian Perrig, Mi...
143
Voted
CIKM
2008
Springer
15 years 5 months ago
Handling implicit geographic evidence for geographic ir
Most geographic information retrieval systems depend on the detection and disambiguation of place names in documents, assuming that the documents with a specific geographic scope ...
Nuno Cardoso, Mário J. Silva, Diana Santos
DLS
2005
101views Languages» more  DLS 2005»
15 years 5 months ago
Flexible object encapsulation for ambient-oriented programming
In the emerging field of Ambient Intelligence (AmI), software is deployed in wireless open networks of mobile devices. Such open networks require stringent security measures as u...
Wolfgang De Meuter, Éric Tanter, Stijn Most...
131
Voted
CLEF
2008
Springer
15 years 5 months ago
Robust Question Answering for Speech Transcripts: UPC Experience in QAst 2008
This paper describes the participation of the Technical University of Catalonia in the CLEF 2008 Question Answering on Speech Transcripts track. We have participated in the Englis...
Pere Comas, Jordi Turmo
« Prev « First page 1071 / 1238 Last » Next »