Sciweavers

372 search results - page 39 / 75
» TDB: A Database System for Digital Rights Management
Sort
View
HOTOS
2003
IEEE
15 years 7 months ago
Flexible OS Support and Applications for Trusted Computing
Trusted computing (e.g. TCPA and Microsoft’s NextGeneration Secure Computing Base) has been one of the most talked about and least understood technologies in the computing commu...
Tal Garfinkel, Mendel Rosenblum, Dan Boneh
DKE
2007
119views more  DKE 2007»
15 years 1 months ago
Error minimization in approximate range aggregates
Histogram techniques have been used in many commercial database management systems to estimate a query result size. Recently, it has been shown that they are very effective to su...
Xuemin Lin, Qing Zhang, Yidong Yuan, Qing Liu
141
Voted
CCGRID
2010
IEEE
14 years 5 months ago
WORKEM: Representing and Emulating Distributed Scientific Workflow Execution State
- Scientific workflows have become an integral part of cyberinfrastructure as their computational complexity and data sizes have grown. However, the complexity of the distributed i...
Lavanya Ramakrishnan, Dennis Gannon, Beth Plale
110
Voted
ACSAC
2005
IEEE
15 years 7 months ago
Java for Mobile Devices: A Security Study
Java 2 Micro-Edition Connected Limited Device Configuration (J2ME CLDC) is the platform of choice when it comes to running mobile applications on resourceconstrained devices (cel...
Mourad Debbabi, Mohamed Saleh, Chamseddine Talhi, ...
121
Voted
CCS
2009
ACM
16 years 2 months ago
Logging key assurance indicators in business processes
Management of a modern enterprise is based on the assumption that executive reports of lower-layer management are faithful to what is actually happening in the field. As some well...
Fabio Massacci, Gene Tsudik, Artsiom Yautsiukhin