Sciweavers

412 search results - page 55 / 83
» Operating Systems Should Provide Transactions
Sort
View
SAC
2008
ACM
13 years 9 months ago
A software architecture for ontology-driven situation awareness
Human operators of large-scale control systems face the problem of information overload induced by the large amount of information provided by multiple heterogeneous and highlydyn...
Norbert Baumgartner, Werner Retschitzegger, Wielan...
PKC
2009
Springer
210views Cryptology» more  PKC 2009»
14 years 10 months ago
Controlling Access to an Oblivious Database Using Stateful Anonymous Credentials
In this work, we consider the task of allowing a content provider to enforce complex access control policies on oblivious protocols conducted with anonymous users. As our primary ...
Scott E. Coull, Matthew Green, Susan Hohenberger
ANLP
1997
190views more  ANLP 1997»
13 years 11 months ago
Disambiguation of Proper Names in Text
Identifying the occurrences of proper names in text and the entities they refer to can be a difficult task because of the manyto-many mapping between names and their referents. We...
Nina Wacholder, Yael Ravin, Misook Choi
CASES
2005
ACM
13 years 11 months ago
SECA: security-enhanced communication architecture
In this work, we propose and investigate the idea of enhancing a System-on-Chip (SoC) communication architecture (the fabric that integrates system components and carries the comm...
Joel Coburn, Srivaths Ravi, Anand Raghunathan, Sri...
IEE
2011
13 years 4 months ago
Using autonomous components to improve runtime qualities of software
: In the development of software systems, quality properties should be considered along with the development process so that the qualities of software systems can be inferred and p...
Wenpin Jiao