Sciweavers

187 search results - page 31 / 38
» Challenges in Securing the Domain Name System
Sort
View
DAC
2007
ACM
14 years 12 months ago
Trusted Hardware: Can It Be Trustworthy?
Processing and storage of confidential or critical information is an every day occurrence in computing systems. The trustworthiness of computing devices has become an important co...
Cynthia E. Irvine, Karl N. Levitt
POPL
2000
ACM
14 years 3 months ago
Enforcing Trace Properties by Program Transformation
We propose an automatic method to enforce trace properties on programs. The programmer specifies the property separately from the program; a program transformer takes the program...
Thomas Colcombet, Pascal Fradet
DEXAW
2005
IEEE
140views Database» more  DEXAW 2005»
14 years 4 months ago
Effective Dynamic Replication in Wide-Area Network Environments: A Perspective
The unprecedented growth of data at geographically distributed locations coupled with tremendous improvement in networking capabilities over the last decade strongly motivate the ...
Anirban Mondal, Masaru Kitsuregawa
ECIR
2006
Springer
14 years 9 days ago
Using Concept-Based Indexing to Improve Language Modeling Approach to Genomic IR
Genomic IR, characterized by its highly specific information need, severe synonym and polysemy problem, long term name and rapid growing literature size, is challenging IR communit...
Xiaohua Zhou, Xiaodan Zhang, Xiaohua Hu
WIRTSCHAFTSINFORMATI
2007
14 years 1 days ago
An Ontology Framework for Semantic Business Process Management
A core challenge in Business Process Management is the continuous, bi-directional translation between (1) a business requirements view on the process space of an enterprise and (2...
Martin Hepp, Dumitru Roman