Sciweavers

804 search results - page 104 / 161
» How to Break Access Control in a Controlled Manner
Sort
View
BIB
2006
169views more  BIB 2006»
15 years 4 months ago
Bio-ontologies: current trends and future directions
: In recent years, as a knowledge-based discipline, bioinformatics has moved to make its knowledge more computationally amenable. After its beginnings in the disciplines as a techn...
Olivier Bodenreider, Robert Stevens
VIS
2007
IEEE
181views Visualization» more  VIS 2007»
16 years 5 months ago
Shadow-Driven 4D Haptic Visualization
Just as we can work with two-dimensional floor plans to communicate 3D architectural design, we can exploit reduced-dimension shadows to manipulate the higher-dimensional objects ...
Hui Zhang, Andrew J. Hanson
143
Voted
VEE
2010
ACM
291views Virtualization» more  VEE 2010»
15 years 11 months ago
Neon: system support for derived data management
Modern organizations face increasingly complex information management requirements. A combination of commercial needs, legal liability and regulatory imperatives has created a pat...
Qing Zhang, John McCullough, Justin Ma, Nabil Sche...
CCS
2009
ACM
15 years 11 months ago
Countering kernel rootkits with lightweight hook protection
Kernel rootkits have posed serious security threats due to their stealthy manner. To hide their presence and activities, many rootkits hijack control flows by modifying control d...
Zhi Wang, Xuxian Jiang, Weidong Cui, Peng Ning
IWAN
2000
Springer
15 years 8 months ago
A Flexible IP Active Networks Architecture
This paper presents the main concepts of the IST Project FAIN "Future Active IP Networks" [10], a three-year collaborative research project, whose main task is to develo...
Alex Galis, Bernhard Plattner, Jonathan M. Smith, ...