Sciweavers
Explore
Publications
Books
Software
Tutorials
Presentations
Lectures Notes
Datasets
Labs
Conferences
Community
Upcoming
Conferences
Top Ranked Papers
Most Viewed Conferences
Conferences by Acronym
Conferences by Subject
Conferences by Year
Tools
PDF Tools
Image Tools
Text Tools
OCR Tools
Symbol and Emoji Tools
On-screen Keyboard
Latex Math Equation to Image
Smart IPA Phonetic Keyboard
Community
Sciweavers
About
Terms of Use
Privacy Policy
Cookies
5119
search results - page 139 / 1024
»
Security Privacy
Sort
relevance
views
votes
recent
update
View
thumb
title
85
click to vote
OOPSLA
2009
Springer
157
views
Security Privacy
»
more
OOPSLA 2009
»
Flapjax: a programming language for Ajax applications
15 years 10 months ago
Download
www.cis.upenn.edu
Leo A. Meyerovich, Arjun Guha, Jacob P. Baskin, Gr...
claim paper
Read More »
115
click to vote
OOPSLA
2009
Springer
169
views
Security Privacy
»
more
OOPSLA 2009
»
Provenance: a future history
15 years 10 months ago
Download
people.seas.harvard.edu
James Cheney, Stephen Chong, Nate Foster, Margo I....
claim paper
Read More »
97
click to vote
IEEEARES
2008
IEEE
106
views
Security Privacy
»
more
IEEEARES 2008
»
Annotating Regulations Using Cerno: An Application to Italian Documents - Extended Abstract
15 years 10 months ago
Download
research.cs.queensu.ca
Nicola Zeni, Nadzeya Kiyavitskaya, James R. Cordy,...
claim paper
Read More »
109
Voted
CCS
2007
ACM
125
views
Security Privacy
»
more
CCS 2007
»
Provable data possession at untrusted stores
15 years 10 months ago
Download
hssl.cs.jhu.edu
Giuseppe Ateniese, Randal C. Burns, Reza Curtmola,...
claim paper
Read More »
80
click to vote
CCS
2007
ACM
82
views
Security Privacy
»
more
CCS 2007
»
Weaving rewrite-based access control policies
15 years 10 months ago
Download
www-spi.lip6.fr
Anderson Santana de Oliveira, Eric Ke Wang, Claude...
claim paper
Read More »
« Prev
« First
page 139 / 1024
Last »
Next »