Sciweavers

4445 search results - page 868 / 889
» Reflective Authorization Systems
Sort
View
DEBS
2008
ACM
14 years 11 months ago
Top-k/w publish/subscribe: finding k most relevant publications in sliding time window w
Existing content-based publish/subscribe systems are designed assuming that all matching publications are equally relevant to a subscription. As we cannot know in advance the dist...
Kresimir Pripuzic, Ivana Podnar Zarko, Karl Aberer
ELPUB
2008
ACM
14 years 11 months ago
The SCOAP3 project: converting the literature of an entire discipline to Open Access
The High-Energy Physics (HEP) community spearheaded Open Access with over half a century of dissemination of pre-prints, culminating in the arXiv system. It is now proposing an Op...
Salvatore Mele
AVI
2010
14 years 11 months ago
iChase: supporting exploration and awareness of editing activities on Wikipedia
To increase its credibility and preserve the trust of its readers, Wikipedia needs to ensure a good quality of its articles. To that end, it is critical for Wikipedia administrato...
Nathalie Henry Riche, Bongshin Lee, Fanny Chevalie...
AVI
2010
14 years 11 months ago
Wakame: sense making of multi-dimensional spatial-temporal data
As our ability to measure the world around us improves, we are quickly generating massive quantities of high-dimensional, spatial-temporal data. In this paper, we concern ourselve...
Clifton Forlines, Kent Wittenburg
DIMVA
2010
14 years 11 months ago
HookScout: Proactive Binary-Centric Hook Detection
Abstract. In order to obtain and maintain control, kernel malware usually makes persistent control flow modifications (i.e., installing hooks). To avoid detection, malware develope...
Heng Yin, Pongsin Poosankam, Steve Hanna, Dawn Xia...