Sciweavers

14190 search results - page 2606 / 2838
» computing 2008
Sort
View
132
Voted
CIKM
2008
Springer
15 years 5 months ago
Mining conceptual graphs for knowledge acquisition
This work addresses the use of computational linguistic analysis techniques for conceptual graphs learning from unstructured texts. A technique including both content mining and i...
Milagros Fernández, Eric Villemonte de la C...
146
Voted
CISC
2008
Springer
148views Cryptology» more  CISC 2008»
15 years 5 months ago
Publicly Verifiable Privacy-Preserving Group Decryption
Anonymity is one of the main concerns in group-oriented cryptography. However, most efforts, for instance, group signatures and ring signatures, are only made to provide anonymity ...
Bo Qin, Qianhong Wu, Willy Susilo, Yi Mu
133
Voted
CISIS
2008
IEEE
15 years 5 months ago
Multi-variant Program Execution: Using Multi-core Systems to Defuse Buffer-Overflow Vulnerabilities
While memory-safe and type-safe languages have been available for many years, the vast majority of software is still implemented in type-unsafe languages such as C/C++. Despite ma...
Babak Salamat, Andreas Gal, Todd Jackson, Karthike...
116
Voted
CIA
2008
Springer
15 years 5 months ago
Collaborative Load-Balancing in Storage Networks Using Agent Negotiation
Abstract. The rapid advances in the computer industry allow building larger systems that require mass storage volumes. As storage space increases, its management becomes increasing...
Shay Raz, Raz Lin, Onn Shehory
123
Voted
CIMCA
2008
IEEE
15 years 5 months ago
Portlets-Based Portal for an E-learning Grid
This paper describes a portlet-based portal that provides user interfaces for access a Grid-based elearning platform. E-learning platforms that exploit resources and computing pow...
Felicia Ionescu, Cristina Elena Stoica, Mircea Dea...
« Prev « First page 2606 / 2838 Last » Next »