Sciweavers

308 search results - page 50 / 62
» Identity as a Service - Towards a Service-Oriented Identity ...
Sort
View
CORR
2006
Springer
104views Education» more  CORR 2006»
13 years 7 months ago
Unmanaged Internet Protocol: Taming the Edge Network Management Crisis
Though appropriate for core Internet infrastructure, the Internet Protocol is unsuited to routing within and between emerging ad-hoc edge networks due to its dependence on hierarc...
Bryan Ford
ISCI
2011
13 years 2 months ago
A tool for design pattern detection and software architecture reconstruction
It is well known that software maintenance and evolution are expensive activities, both in terms of invested time and money. Reverse engineering activities support the obtainment ...
Francesca Arcelli Fontana, Marco Zanoni
HICSS
2010
IEEE
216views Biometrics» more  HICSS 2010»
14 years 24 days ago
A Virtualization Architecture for In-Depth Kernel Isolation
Recent advances in virtualization technologies have sparked a renewed interest in the use of kernel and process virtualization as a security mechanism to enforce resource isolatio...
Jiang Wang, Sameer Niphadkar, Angelos Stavrou, Anu...
SIGIR
2012
ACM
11 years 10 months ago
Identifying entity aspects in microblog posts
Online reputation management is about monitoring and handling the public image of entities (such as companies) on the Web. An important task in this area is identifying aspects of...
Damiano Spina, Edgar Meij, Maarten de Rijke, Andre...
LOCA
2009
Springer
14 years 2 months ago
Location Diversity: Enhanced Privacy Protection in Location Based Services
Abstract. Location-based Services are emerging as popular applications in pervasive computing. Spatial k-anonymity is used in Locationbased Services to protect privacy, by hiding t...
Mingqiang Xue, Panos Kalnis, Hung Keng Pung