Sciweavers

5206 search results - page 1008 / 1042
» The Architecture Of An Active Data Base Management System
Sort
View
ICICS
2005
Springer
15 years 7 months ago
Remotely Keyed Cryptographics Secure Remote Display Access Using (Mostly) Untrusted Hardware
Software that covertly monitors a user’s actions, also known as spyware, has become a first-level security threat due to its ubiquity and the difficulty of detecting and remov...
Debra L. Cook, Ricardo A. Baratto, Angelos D. Kero...
164
Voted
TABLEAUX
2000
Springer
15 years 5 months ago
Benchmark Analysis with FaCT
FaCT (Fast Classification of Terminologies) is a Description Logic (DL) classifier that can also be used for modal logic satisfiability testing. The FaCT system includes two reason...
Ian Horrocks
INFFUS
2007
107views more  INFFUS 2007»
15 years 1 months ago
An information fusion demonstrator for tactical intelligence processing in network-based defense
The Swedish Defence Research Agency (FOI) has developed a concept demonstrator called the Information Fusion Demonstrator 2003 (IFD03) for demonstrating information fusion methodo...
Simon Ahlberg, Pontus Hörling, Katarina Johan...
MICRO
2009
IEEE
315views Hardware» more  MICRO 2009»
15 years 8 months ago
Control flow obfuscation with information flow tracking
Recent micro-architectural research has proposed various schemes to enhance processors with additional tags to track various properties of a program. Such a technique, which is us...
Haibo Chen, Liwei Yuan, Xi Wu, Binyu Zang, Bo Huan...
126
Voted
SAC
2003
ACM
15 years 7 months ago
Design Time Support for Adaptive Behavior in Web Sites
Adaptive web sites are sites that automatically improve their internal organization and/or presentation by observing userbrowsing behavior. In this paper we argue that adaptive be...
Sven Casteleyn, Olga De Troyer, Saar Brockmans
« Prev « First page 1008 / 1042 Last » Next »