Sciweavers

262 search results - page 43 / 53
» Providing Trusted Components to the Industry
Sort
View
CORR
2011
Springer
199views Education» more  CORR 2011»
14 years 1 months ago
Surrogate Parenthood: Protected and Informative Graphs
Many applications, including provenance and some analyses of social networks, require path-based queries over graphstructured data. When these graphs contain sensitive information...
Barbara T. Blaustein, Adriane Chapman, Len Seligma...
VSTTE
2010
Springer
14 years 7 months ago
Towards Scalable Modular Checking of User-Defined Properties
Abstract. Theorem-prover based modular checkers have the potential to perform scalable and precise checking of user-defined properties by combining pathsensitive intraprocedural re...
Thomas Ball, Brian Hackett, Shuvendu K. Lahiri, Sh...
SP
2006
IEEE
169views Security Privacy» more  SP 2006»
15 years 3 months ago
A Safety-Oriented Platform for Web Applications
The Web browser has become the dominant interface to a broad range of applications, including online banking, Web-based email, digital media delivery, gaming, and ecommerce servic...
Richard S. Cox, Steven D. Gribble, Henry M. Levy, ...
SIGOPSE
1998
ACM
15 years 1 months ago
Distributed virtual machines: a system architecture for network computing
Modern virtual machines, such as Java and Inferno, are emerging as network computing s. While these virtual machines provide higher-level abstractions and more sophisticated servi...
Emin Gün Sirer, Robert Grimm, Brian N. Bersha...
IJET
2007
214views more  IJET 2007»
14 years 9 months ago
Employing Collaborative Learning Strategies in Online Conflict Resolution
—Although some critics may argue that conflict resolution cannot be carried out appropriately by virtual education, the basic elements of conflict present themselves within dista...
Samir Abou El-Seoud, Carme Anguera Iglesias, Marga...