Sciweavers

5643 search results - page 118 / 1129
» Retrieval Evaluation in Practice
Sort
View
SP
2008
IEEE
138views Security Privacy» more  SP 2008»
15 years 4 months ago
Practical Proactive Integrity Preservation: A Basis for Malware Defense
Unlike today’s reactive approaches, information flow based approaches can provide positive assurances about overall system integrity, and hence can defend against sophisticated...
Weiqing Sun, R. Sekar, Gaurav Poothia, Tejas Karan...
OTM
2007
Springer
15 years 4 months ago
Hawkeye: A Practical Large Scale Demonstration of Semantic Web Integration
Abstract. We discuss our DLDB knowledge base system and evaluate its capability in processing a very large set of real-world Semantic Web data. Using DLDB, we have constructed the ...
Zhengxiang Pan, Abir Qasem, Sudhan Kanitkar, Fabia...
ACSAC
2006
IEEE
15 years 4 months ago
From Languages to Systems: Understanding Practical Application Development in Security-typed Languages
Security-typed languages are an evolving tool for implementing systems with provable security guarantees. However, to date, these tools have only been used to build simple “toy...
Boniface Hicks, Kiyan Ahmadizadeh, Patrick Drew Mc...
ICPPW
2005
IEEE
15 years 3 months ago
A Practical Approach to the Rating of Barrier Algorithms Using the LogP Model and Open MPI
Large–scale parallel applications performing global synchronization may spend a significant amount of execution time waiting for the completion of a barrier operation. Conseque...
Torsten Hoefler, Lavinio Cerquetti, Torsten Mehlan...
CBSE
2004
Springer
15 years 3 months ago
CB-SPE Tool: Putting Component-Based Performance Engineering into Practice
A crucial issue in the design of Component-Based (CB) applications is the ability to early guarantee that the system under development will satisfy its Quality of Service requireme...
Antonia Bertolino, Raffaela Mirandola