Sciweavers

3068 search results - page 558 / 614
» Separation Results on the
Sort
View
PLDI
2006
ACM
15 years 5 months ago
Refactoring programs to secure information flows
Adding a sound information flow security policy to an existing program is a difficult task that requires major analysis of and changes to the program. In this paper we show how ...
Scott F. Smith, Mark Thober
SIGCPR
2006
ACM
106views Hardware» more  SIGCPR 2006»
15 years 5 months ago
Cross-cultural influences on women in the IT workforce
A review of 862 papers published in SIGMIS/CPR proceedings over the past 44 years revealed only 29 articles that focused on gender and the IT workforce or gender and IT education,...
Eileen M. Trauth, Jeria L. Quesenberry, Haiyan Hua...
SIGIR
2006
ACM
15 years 5 months ago
Hybrid index maintenance for growing text collections
We present a new family of hybrid index maintenance strategies to be used in on-line index construction for monotonically growing text collections. These new strategies improve up...
Stefan Büttcher, Charles L. A. Clarke, Brad L...
WIKIS
2006
ACM
15 years 5 months ago
Translation the Wiki way
This paper discusses the design and implementation of processes and tools to support the collaborative creation and maintenance of multilingual wiki content. A wiki is a website w...
Alain Désilets, Lucas Gonzalez, Séba...
AINA
2005
IEEE
15 years 5 months ago
A Single-Computer Grid Gateway Using Virtual Machines
Grid middleware is enabling resource sharing between computing centres across the world and sites with existing clusters are eager to connect to the Grid. However, the hardware re...
Stephen Childs, Brian A. Coghlan, David O'Callagha...