Sciweavers

1748 search results - page 319 / 350
» Using Aspect Programming to Secure Web Applications
Sort
View
SEMWEB
2001
Springer
15 years 6 months ago
OntoMap - the Guide to the Upper-Level
Abstract. The upper-level ontologies are theories that capture the most common concepts, which are relevant for many of the tasks involving knowledge extraction, representation, an...
Atanas K. Kirakov, Marin Dimitrov
UM
2009
Springer
15 years 8 months ago
PerspectiveSpace: Opinion Modeling with Dimensionality Reduction
Abstract. Words mean different things to different people, and capturing these differences is often a subtle art. These differences are often “a matter of perspective,” and...
Jason B. Alonso, Catherine Havasi, Henry Lieberman
HPCA
2003
IEEE
16 years 2 months ago
Evaluating the Impact of Communication Architecture on the Performability of Cluster-Based Services
We consider the impact of different communication architectures on the performability (performance + availability) of cluster-based servers. In particular, we use a combination of ...
Kiran Nagaraja, Neeraj Krishnan, Ricardo Bianchini...
HUC
1999
Springer
15 years 6 months ago
InfoStick: An Interaction Device for Inter-Appliance Computing
Abstract. Many electric appliances have recently become network reachable, and we would receive better services from them if we could use them in combination. We have therefore dev...
Naohiko Kohtake, Jun Rekimoto, Yuichiro Anzai
109
Voted
SP
2010
IEEE
174views Security Privacy» more  SP 2010»
15 years 5 months ago
HyperSafe: A Lightweight Approach to Provide Lifetime Hypervisor Control-Flow Integrity
— Virtualization is being widely adopted in today’s computing systems. Its unique security advantages in isolating and introspecting commodity OSes as virtual machines (VMs) ha...
Zhi Wang, Xuxian Jiang