Sciweavers

2237 search results - page 50 / 448
» Storing information with extractors
Sort
View
HPCA
2006
IEEE
16 years 6 days ago
InfoShield: a security architecture for protecting information usage in memory
Cyber theft is a serious threat to Internet security. It is one of the major security concerns by both network service providers and Internet users. Though sensitive information c...
Guofei Gu, Hsien-Hsin S. Lee, Joshua B. Fryman, Ju...
EUROSSC
2006
Springer
15 years 3 months ago
Towards Hovering Information
This paper introduces a new concept of information that can exist in a mobile environment with no fixed infrastructure and centralized servers, which we call the Hovering Informati...
Alfredo A. Villalba Castro, Dimitri Konstantas
CIDR
2007
208views Algorithms» more  CIDR 2007»
15 years 1 months ago
Impliance: A Next Generation Information Management Appliance
Though database technology has been remarkably successful in building a large market and adapting to the changes of the last three decades, its impact on the broader market of inf...
Bishwaranjan Bhattacharjee, Joseph S. Glider, Rich...
88
Voted
BMCBI
2006
126views more  BMCBI 2006»
14 years 12 months ago
JUICE: a data management system that facilitates the analysis of large volumes of information in an EST project workflow
Background: Expressed sequence tag (EST) analyses provide a rapid and economical means to identify candidate genes that may be involved in a particular biological process. These E...
Mariano Latorre, Herman Silva, Juan Saba, Carito G...
ISCA
2008
IEEE
185views Hardware» more  ISCA 2008»
14 years 12 months ago
From Speculation to Security: Practical and Efficient Information Flow Tracking Using Speculative Hardware
Dynamic information flow tracking (also known as taint tracking) is an appealing approach to combat various security attacks. However, the performance of applications can severely...
Haibo Chen, Xi Wu, Liwei Yuan, Binyu Zang, Pen-Chu...