Sciweavers

1363 search results - page 235 / 273
» Event-based applications and enabling technologies
Sort
View
CHI
2004
ACM
14 years 10 months ago
Ambient agoras: InfoRiver, SIAM, Hello.Wall
This demonstration reports results from the EU-funded project Ambient Agoras, investigating future applications of ubiquitous and ambient computing in workspaces. Instead of prese...
Thorsten Prante, Richard Stenzel, Carsten Röc...
CCS
2009
ACM
14 years 4 months ago
Secure in-VM monitoring using hardware virtualization
Kernel-level attacks or rootkits can compromise the security of an operating system by executing with the privilege of the kernel. Current approaches use virtualization to gain hi...
Monirul I. Sharif, Wenke Lee, Weidong Cui, Andrea ...
WEBDB
2005
Springer
100views Database» more  WEBDB 2005»
14 years 3 months ago
Malleable Schemas: A Preliminary Report
Large-scale information integration, and in particular, search on the World Wide Web, is pushing the limits on the combination of structured data and unstructured data. By its ver...
Xin Dong, Alon Y. Halevy
SEMWEB
2004
Springer
14 years 3 months ago
Applying KAoS Services to Ensure Policy Compliance for Semantic Web Services Workflow Composition and Enactment
In this paper we describe our experience in applying KAoS services to ensure policy compliance for Semantic Web Services workflow composition and enactment. We are developing thes...
Andrzej Uszok, Jeffrey M. Bradshaw, Renia Jeffers,...
CCS
2007
ACM
14 years 1 months ago
Reconfigurable trusted computing in hardware
Trusted Computing (TC) is an emerging technology towards building trustworthy computing platforms. The Trusted Computing Group (TCG) has proposed several specifications to impleme...
Thomas Eisenbarth, Tim Güneysu, Christof Paar...