Sciweavers

158 search results - page 24 / 32
» An Approach to Advanced Data Synchronization in Complex Proc...
Sort
View
USENIX
2007
13 years 10 months ago
From Trusted to Secure: Building and Executing Applications That Enforce System Security
Commercial operating systems have recently introduced mandatory access controls (MAC) that can be used to ensure system-wide data confidentiality and integrity. These protections...
Boniface Hicks, Sandra Rueda, Trent Jaeger, Patric...
ICDM
2007
IEEE
132views Data Mining» more  ICDM 2007»
14 years 2 months ago
Granularity Conscious Modeling for Probabilistic Databases
The convergence of embedded sensor systems and stream query processing suggests an important role for database techniques, in managing data that only partially – and often inacc...
Eirinaios Michelakis, Daisy Zhe Wang, Minos N. Gar...
HICSS
2010
IEEE
216views Biometrics» more  HICSS 2010»
14 years 29 days ago
A Virtualization Architecture for In-Depth Kernel Isolation
Recent advances in virtualization technologies have sparked a renewed interest in the use of kernel and process virtualization as a security mechanism to enforce resource isolatio...
Jiang Wang, Sameer Niphadkar, Angelos Stavrou, Anu...
ENVSOFT
2007
108views more  ENVSOFT 2007»
13 years 7 months ago
Modeling biocomplexity - actors, landscapes and alternative futures
: Increasingly, models (and modelers) are being asked to address the interactions between human influences, ecological processes, and landscape dynamics that impact many diverse as...
John P. Bolte, David W. Hulse, Stanley V. Gregory,...
JMLR
2008
127views more  JMLR 2008»
13 years 7 months ago
Incremental Identification of Qualitative Models of Biological Systems using Inductive Logic Programming
The use of computational models is increasingly expected to play an important role in predicting the behaviour of biological systems. Models are being sought at different scales o...
Ashwin Srinivasan, Ross D. King