Sciweavers

10263 search results - page 1916 / 2053
» From Use Cases to System Operation Specifications
Sort
View
ASPLOS
2004
ACM
14 years 2 months ago
Secure program execution via dynamic information flow tracking
Dynamic information flow tracking is a hardware mechanism to protect programs against malicious attacks by identifying spurious information flows and restricting the usage of sp...
G. Edward Suh, Jae W. Lee, David Zhang, Srinivas D...
GIS
2006
ACM
14 years 10 months ago
Analyzing theme, space, and time: an ontology-based approach
The W3C's Semantic Web Activity is illustrating the use of semantics for information integration, search, and analysis. However, the majority of the work in this community ha...
Matthew Perry, Farshad Hakimpour, Amit P. Sheth
CCS
2009
ACM
14 years 3 months ago
MYSEA: the monterey security architecture
Mandated requirements to share information across different sensitivity domains necessitate the design of distributed architectures to enforce information flow policies while pr...
Cynthia E. Irvine, Thuy D. Nguyen, David J. Shiffl...
ICAC
2008
IEEE
14 years 3 months ago
1000 Islands: Integrated Capacity and Workload Management for the Next Generation Data Center
Recent advances in hardware and software virtualization offer unprecedented management capabilities for the mapping of virtual resources to physical resources. It is highly desira...
Xiaoyun Zhu, Donald Young, Brian J. Watson, Zhikui...
EDOC
2007
IEEE
14 years 3 months ago
Publishing of Interoperable Services and Processes in UDDI
— This paper presents a requirements analysis and a solution approach to representing workflow processes conforming to the Wf-XML/ASAP standard proposal in a UDDI registry. Wf-X...
Marcus Spies, Harald Schöning, Keith Swenson
« Prev « First page 1916 / 2053 Last » Next »