Sciweavers

1774 search results - page 36 / 355
» The Networked Semantic Desktop
Sort
View
ACSAC
2008
IEEE
15 years 1 months ago
Preventing Information Leaks through Shadow Executions
A concern about personal information confidentiality typically arises when any desktop application communicates to the external network, for example, to its producer's server...
Roberto Capizzi, Antonio Longo, V. N. Venkatakrish...
RAID
2010
Springer
14 years 9 months ago
Community Epidemic Detection Using Time-Correlated Anomalies
Abstract. An epidemic is malicious code running on a subset of a community, a homogeneous set of instances of an application. Syzygy is an epidemic detection framework that looks f...
Adam J. Oliner, Ashutosh V. Kulkarni, Alex Aiken
85
Voted
ENTCS
2007
96views more  ENTCS 2007»
14 years 11 months ago
An Observational Theory for Mobile Ad Hoc Networks
We propose a process calculus to study the behavioural theory of Mobile Ad Hoc Networks. The operational semantics of our calculus is given both in terms of a Reduction Semantics ...
Massimo Merro
ISCA
1991
IEEE
121views Hardware» more  ISCA 1991»
15 years 2 months ago
IXM2: A Parallel Associative Processor
This paper describes a parallel associative processor, IXM2, developed mainly for semantic network processing. IXM2 consists of 64 associative processors and 9 network processors,...
Tetsuya Higuchi, Tatsumi Furuya, Ken'ichi Handa, N...
DKE
2007
162views more  DKE 2007»
14 years 11 months ago
A new algorithm for clustering search results
We develop a new algorithm for clustering search results. Differently from many other clustering systems that have been recently proposed as a post-processing step for Web search ...
Giansalvatore Mecca, Salvatore Raunich, Alessandro...