Sciweavers

1471 search results - page 233 / 295
» Derivation of Backup Service Management Applications from Se...
Sort
View
PIMRC
2008
IEEE
14 years 4 months ago
Active Highways (Position Paper)
—Highways are an essential component of our society because they are critical to quality of life and to local and national economies. Under good conditions, highways provide a sa...
Liviu Iftode, Stephen Smaldone, Mario Gerla, James...
EDBT
2009
ACM
135views Database» more  EDBT 2009»
14 years 3 months ago
Provenance for nested subqueries
Data provenance is essential in applications such as scientific computing, curated databases, and data warehouses. Several systems have been developed that provide provenance fun...
Boris Glavic, Gustavo Alonso
DEXAW
2007
IEEE
104views Database» more  DEXAW 2007»
14 years 4 months ago
An MDA Approach to Implement Personal IR Tools
We introduce TIRA1 , a software architecture for the rapid prototyping of tailored information retrieval (IR) tools. TIRA allows to compose personal IR tools from atomic IR servic...
Sven Meyer zu Eissen, Benno Stein
ESORICS
2007
Springer
14 years 4 months ago
SilentKnock: Practical, Provably Undetectable Authentication
Port knocking is a technique first introduced in the blackhat and trade literature to prevent attackers from discovering and exploiting potentially vulnerable services on a networ...
Eugene Y. Vasserman, Nicholas Hopper, John Laxson,...
AROBOTS
2002
105views more  AROBOTS 2002»
13 years 10 months ago
A Social Robot that Stands in Line
Recent research in mobile robot navigation make it feasible to utilize autonomous robots in service fields. But, such applications require more than just navigation. To operate in...
Yasushi Nakauchi, Reid G. Simmons