Sciweavers

1611 search results - page 299 / 323
» Experimental Integration of Planning in a Distributed Contro...
Sort
View
ACSAC
2010
IEEE
13 years 5 months ago
Porscha: policy oriented secure content handling in Android
The penetration of cellular networks worldwide and emergence of smart phones has led to a revolution in mobile content. Users consume diverse content when, for example, exchanging...
Machigar Ongtang, Kevin R. B. Butler, Patrick Drew...
WWW
2008
ACM
14 years 8 months ago
Personalized web exploration with task models
Personalized Web search has emerged as one of the hottest topics for both the Web industry and academic researchers. However, the majority of studies on personalized search focuse...
Jae-wook Ahn, Peter Brusilovsky, Daqing He, Jonath...
NDSS
2005
IEEE
14 years 1 months ago
One-Way Isolation: An Effective Approach for Realizing Safe Execution Environments
In this paper, we present an approach for realizing a safe execution environment (SEE) that enables users to “try out” new software (or configuration changes to existing soft...
Weiqing Sun, Zhenkai Liang, V. N. Venkatakrishnan,...
SUTC
2008
IEEE
14 years 1 months ago
Using Body Sensor Networks for Increased Safety in Bomb Disposal Missions
Bomb disposal manned missions are inherently safetycritical. Wireless Sensor Network (WSN) technology potentially offers an opportunity to increase the safety of the operatives in...
John Kemp, Elena I. Gaura, James Brusey, C. Dougla...
BMCBI
2008
116views more  BMCBI 2008»
13 years 7 months ago
Gene Ontology annotations: what they mean and where they come from
To address the challenges of information integration and retrieval, the computational genomics community increasingly has come to rely on the methodology of creating annotations o...
David P. Hill, Barry Smith, Monica S. McAndrews-Hi...