Sciweavers

5269 search results - page 1030 / 1054
» Operating system resource management
Sort
View
CRYPTO
1987
Springer
87views Cryptology» more  CRYPTO 1987»
14 years 3 days ago
How to Make Replicated Data Secure
Many distributed systems manage some form of long-lived data, such as files or data bases. The performance and fault-tolerance of such systems may be enhanced if the repositories ...
Maurice Herlihy, J. D. Tygar
DIMVA
2008
13 years 10 months ago
Expanding Malware Defense by Securing Software Installations
Software installation provides an attractive entry vector for malware: since installations are performed with administrator privileges, malware can easily get the enhanced level of...
Weiqing Sun, R. Sekar, Zhenkai Liang, V. N. Venkat...
DGO
2003
133views Education» more  DGO 2003»
13 years 10 months ago
Accessing Diverse Geo-Referenced Data Sources with the SAND Spatial DBMS
The Internet has become the most frequently accessed medium for obtaining various types of data. In particular, government agencies, academic institutions, and private enterprises...
Jagan Sankaranarayanan, Egemen Tanin, Hanan Samet,...
MVA
1992
188views Computer Vision» more  MVA 1992»
13 years 9 months ago
The Programmable and Configurable Low Level Vision Unit of the HERMIA Machine
In this work the Low Level Vision Unit (LLVU) of the Heterogeneous and Reconfigurable Machine for Image Analysis (HERMIA) is described. The LLVU consists of the innovative integra...
Gaetano Gerardi, Giancarlo Parodi
JUCS
2007
152views more  JUCS 2007»
13 years 8 months ago
The SEWASIE Network of Mediator Agents for Semantic Search
: Integration of heterogeneous information in the context of Internet becomes a key activity to enable a more organized and semantically meaningful access to data sources. As Inter...
Domenico Beneventano, Sonia Bergamaschi, Francesco...
« Prev « First page 1030 / 1054 Last » Next »