Sciweavers

144 search results - page 4 / 29
» Application-Level Isolation Using Data Inconsistency Detecti...
Sort
View
IDEAS
1999
IEEE
101views Database» more  IDEAS 1999»
13 years 11 months ago
Integration of Semistructured Data with Partial and Inconsistent Information
Data integration of several sources has gained considerable attentions with the recent popularity of the Web. In the real world, some information may be missing i.e., partial and ...
Mengchi Liu, Tok Wang Ling, Tao Guan
VMCAI
2009
Springer
14 years 2 months ago
Finding Concurrency-Related Bugs Using Random Isolation
This paper describes the methods used in Empire, a tool to detect concurrency-related bugs, namely atomic-set serializability violations in Java programs. The correctness criterion...
Nicholas Kidd, Thomas W. Reps, Julian Dolby, Manda...
IJNSEC
2011
232views more  IJNSEC 2011»
13 years 2 months ago
Location-aware, Trust-based Detection and Isolation of Compromised Nodes in Wireless Sensor Networks
The detection and isolation of compromised nodes in wireless sensor networks is a difficult task. However, failure to identify and isolate compromised nodes results in significan...
Garth V. Crosby, Lance Hester, Niki Pissinou
SOSP
2005
ACM
14 years 4 months ago
Mondrix: memory isolation for linux using mondriaan memory protection
This paper presents the design and an evaluation of Mondrix, a version of the Linux kernel with Mondriaan Memory Protection (MMP). MMP is a combination of hardware and software th...
Emmett Witchel, Junghwan Rhee, Krste Asanovic
SEMWEB
2007
Springer
14 years 1 months ago
Scalable Cleanup of Information Extraction Data Using Ontologies
Abstract. The approach of using ontology reasoning to cleanse the output of information extraction tools was first articulated in SemantiClean. A limiting factor in applying this ...
Julian Dolby, James Fan, Achille Fokoue, Aditya Ka...