Sciweavers

1995 search results - page 282 / 399
» Belief in Information Flow
Sort
View
GIS
2008
ACM
14 years 11 months ago
Integrating gazetteers and remote sensed imagery
This work explores the potential for increased synergy between gazetteers and high-resolution remote sensed imagery. These two data sources are complementary. Gazetteers provide h...
Shawn Newsam, Yi Yang
HICSS
2009
IEEE
209views Biometrics» more  HICSS 2009»
14 years 5 months ago
SIDD: A Framework for Detecting Sensitive Data Exfiltration by an Insider Attack
Detecting and mitigating insider threat is a critical element in the overall information protection strategy. By successfully implementing tactics to detect this threat, organizat...
Yali Liu, Cherita L. Corbett, Ken Chiang, Rennie A...
VLDB
2007
ACM
89views Database» more  VLDB 2007»
14 years 4 months ago
GhostDB: Hiding Data from Prying Eyes
Imagine that you have been entrusted with private data, such as corporate product information, sensitive government information, or symptom and treatment information about hospita...
Christophe Salperwyck, Nicolas Anciaux, Mehdi Benz...
DSRT
2004
IEEE
14 years 1 months ago
An Architecture for Web-Services Based Interest Management in Real Time Distributed Simulation
The Experimentation Command and Control Interface (XC2I) project has developed an architecture for a Webservice based viewer/controller for use with distributed simulations suppor...
Katherine L. Morse, Ryan Brunton, J. Mark Pullen, ...
CC
2008
Springer
138views System Software» more  CC 2008»
14 years 6 days ago
Improved Memory-Access Analysis for x86 Executables
Over the last seven years, we have developed static-analysis methods to recover a good approximation to the variables and dynamically allocated memory objects of a stripped executa...
Thomas W. Reps, Gogul Balakrishnan