Sciweavers

2565 search results - page 463 / 513
» Integrating Natural Language Processing and Knowledge Based ...
Sort
View
USENIX
2007
13 years 10 months ago
From Trusted to Secure: Building and Executing Applications That Enforce System Security
Commercial operating systems have recently introduced mandatory access controls (MAC) that can be used to ensure system-wide data confidentiality and integrity. These protections...
Boniface Hicks, Sandra Rueda, Trent Jaeger, Patric...
CASES
2006
ACM
14 years 1 months ago
Extensible control architectures
Architectural advances of modern systems has often been at odds with control complexity, requiring significant effort in both design and verification. This is particularly true ...
Greg Hoover, Forrest Brewer, Timothy Sherwood
ECLIPSE
2006
ACM
14 years 1 months ago
Guidance through active concerns
Producing usable documentation has always been a tedious task, and even communicating important knowledge about a system among collaborators is difficult. This paper describes an ...
Barthélémy Dagenais, Harold Ossher
HSNMC
2004
Springer
125views Multimedia» more  HSNMC 2004»
14 years 1 months ago
Design and Implementation of a Semantic Peer-to-Peer Network
Decentralized and unstructured peer-to-peer (P2P) networks such as Gnutella are attractive for large-scale information retrieval and search systems due to scalability, fault-tolera...
Kiyohide Nakauchi, Hiroyuki Morikawa, Tomonori Aoy...
IV
2003
IEEE
123views Visualization» more  IV 2003»
14 years 1 months ago
Visualizing Common Ground
The process of analyzing and using information is often collaborative in nature especially given the broad and multi-disciplinary tasks that we must support today. Collaboration r...
Mei C. Chuah, Steven F. Roth