Sciweavers

1646 search results - page 199 / 330
» Automatic generation of two-party computations
Sort
View
BIRTHDAY
2009
Springer
14 years 4 months ago
Clio: Schema Mapping Creation and Data Exchange
Abstract. The Clio project provides tools that vastly simplify information integration. Information integration requires data conversions to bring data in different representation...
Ronald Fagin, Laura M. Haas, Mauricio A. Hern&aacu...
CASES
2006
ACM
14 years 3 months ago
High-level languages for small devices: a case study
In this paper we study, through a concrete case, the feasibility of using a high-level, general-purpose logic language in the design and implementation of applications targeting w...
Manuel Carro, José F. Morales, Henk L. Mull...
DSN
2005
IEEE
14 years 3 months ago
Authenticated System Calls
System call monitoring is a technique for detecting and controlling compromised applications by checking at runtime that each system call conforms to a policy that specifies the ...
Mohan Rajagopalan, Matti A. Hiltunen, Trevor Jim, ...
ANCS
2005
ACM
14 years 3 months ago
High-throughput linked-pattern matching for intrusion detection systems
This paper presents a hardware architecture for highly efficient intrusion detection systems. In addition, a software tool for automatically generating the hardware is presented....
Zachary K. Baker, Viktor K. Prasanna
SAC
2004
ACM
14 years 3 months ago
Design and implementation of component-based adaptive Web presentations
Engineering adaptive Web applications implies the development of content that can be automatically adjusted to varying client devices and user preferences. To meet this requiremen...
Zoltán Fiala, Michael Hinz, Geert-Jan Hoube...