Sciweavers

6651 search results - page 1223 / 1331
» Translating Web Data
Sort
View
110
Voted
SP
2010
IEEE
157views Security Privacy» more  SP 2010»
15 years 7 months ago
Bootstrapping Trust in Commodity Computers
Trusting a computer for a security-sensitive task (such as checking email or banking online) requires the user to know something about the computer’s state. We examine research ...
Bryan Parno, Jonathan M. McCune, Adrian Perrig
123
Voted
EDBT
2009
ACM
164views Database» more  EDBT 2009»
15 years 7 months ago
Efficient identification of starters and followers in social media
Activity and user engagement in social media such as web logs, wikis, online forums or social networks has been increasing at unprecedented rates. In relation to social behavior i...
Michael Mathioudakis, Nick Koudas
157
Voted
HIPC
2007
Springer
15 years 7 months ago
Accomplishing Approximate FCFS Fairness Without Queues
First Come First Served (FCFS) is a policy that is accepted for implementing fairness in a number of application domains such as scheduling in Operating Systems, scheduling web req...
K. Subramani, Kamesh Madduri
132
Voted
ACSAC
2004
IEEE
15 years 7 months ago
Detecting Attacks That Exploit Application-Logic Errors Through Application-Level Auditing
Host security is achieved by securing both the operating system kernel and the privileged applications that run on top of it. Application-level bugs are more frequent than kernel-...
Jingyu Zhou, Giovanni Vigna
192
Voted
COMPSAC
2004
IEEE
15 years 7 months ago
Services-Oriented Dynamic Reconfiguration Framework for Dependable Distributed Computing
Web services (WS) received significant attention recently because services can be searched, bound, and executed at runtime over the Internet. This paper proposes a dynamic reconfi...
Wei-Tek Tsai, Weiwei Song, Raymond A. Paul, Zhibin...
« Prev « First page 1223 / 1331 Last » Next »