Sciweavers

568 search results - page 82 / 114
» A query language for analyzing networks
Sort
View
NDSS
2003
IEEE
14 years 1 months ago
Access Control Based on Execution History
Security is a major, frequent concern in extensible software systems such as Java Virtual Machines and the Common Language Runtime. These systems aim to enable simple, classic app...
Martín Abadi, Cédric Fournet
PLDI
2004
ACM
14 years 2 months ago
Cloning-based context-sensitive pointer alias analysis using binary decision diagrams
This paper presents the first scalable context-sensitive, inclusionbased pointer alias analysis for Java programs. Our approach to context sensitivity is to create a clone of a m...
John Whaley, Monica S. Lam
CIKM
2008
Springer
13 years 10 months ago
Efficient sampling of information in social networks
As online social networking emerges, there has been increased interest to utilize the underlying social structure as well as the available social information to improve search. In...
Gautam Das, Nick Koudas, Manos Papagelis, Sushruth...
BMCBI
2010
219views more  BMCBI 2010»
13 years 3 months ago
BiologicalNetworks 2.0 - an integrative view of genome biology data
Background: A significant problem in the study of mechanisms of an organism's development is the elucidation of interrelated factors which are making an impact on the differe...
Sergey Kozhenkov, Yulia Dubinina, Mayya Sedova, Am...
IPPS
2006
IEEE
14 years 2 months ago
Trust overlay networks for global reputation aggregation in P2P grid computing
1 This paper presents a new approach to trusted Grid computing in a Peer-to-Peer (P2P) setting. Trust and security are essential to establish lasting working relationships among th...
Runfang Zhou, Kai Hwang