Sciweavers

5344 search results - page 367 / 1069
» Privacy-Preserving Set Operations
Sort
View
SAMOS
2004
Springer
15 years 10 months ago
The Molen Programming Paradigm
— In this paper we present the Molen programming paradigm, which is a sequential consistency paradigm for programming Custom Computing Machines (CCM). The programming paradigm al...
Stamatis Vassiliadis, Georgi Gaydadjiev, Koen Bert...
ACSAC
2003
IEEE
15 years 10 months ago
Experimenting with a Policy-Based HIDS Based on an Information Flow Control Model
In [1], we proposed a model for policy-based intrusion detection, based on information flow control. In the present paper, we show its applicability and effectiveness on a stand...
Jacob Zimmermann, Ludovic Mé, Christophe Bi...
ICALT
2003
IEEE
15 years 10 months ago
Visualization of the Learning Process Using Concept Mapping
Visualization of the learning processes is a powerful way to help students to understand their curricula and the structure behind them. CME2 is a prototype software of this favour...
Jussi A. Nuutinen, Erkki Sutinen
RTSS
2003
IEEE
15 years 10 months ago
A Hybrid Control Design for QoS Management
In this paper we present an approach for QoS management that can be applied to a general class of real-time distributed computation systems. In the proposed approach a switching h...
Sherif Abdelwahed, Sandeep Neema, Joseph P. Loyall...
CAISE
2003
Springer
15 years 10 months ago
Empowering Databases for Context-Dependent Information Delivery
Abstract. We present a web-publishing platform that was developed by integrating key constructs and operations for web content delivery into the core of an object-oriented database...
Moira C. Norrie, Alexios Palinginis