Sciweavers

2446 search results - page 429 / 490
» Principles of dataspace systems
Sort
View
CCS
2009
ACM
14 years 3 months ago
Keep your friends close: the necessity for updating an anomaly sensor with legitimate environment changes
Large-scale distributed systems have dense, complex code-bases that are assumed to perform multiple and inter-dependent tasks while user interaction is present. The way users inte...
Angelos Stavrou, Gabriela F. Cretu-Ciocarlie, Mich...
ISCC
2009
IEEE
159views Communications» more  ISCC 2009»
14 years 3 months ago
Synchronous ultra-wide band wireless sensors networks for oil and gas exploration
Abstract— The fluctuations of the price of crude oil is pushing the oil companies to increase the investments in seismic exploration of new oil and gas reservoir. Seismic explor...
Stefano Savazzi, Umberto Spagnolini
EMISA
2009
Springer
14 years 3 months ago
A Thing Called "Fluid Process" - Beyond Rigidity in Business Process
: This keynote reports on a new class of processes - so called fluid processes - whose ”engineering” and ”use” is indistinguishable. Fluid processes are continually being ...
Manfred Reichert
SACMAT
2009
ACM
14 years 3 months ago
Trojan horse resistant discretionary access control
Modern operating systems primarily use Discretionary Access Control (DAC) to protect files and other operating system resources. DAC mechanisms are more user-friendly than Mandat...
Ziqing Mao, Ninghui Li, Hong Chen, Xuxian Jiang
SP
2008
IEEE
129views Security Privacy» more  SP 2008»
14 years 3 months ago
Secure Web Browsing with the OP Web Browser
Abstract—Current web browsers are plagued with vulnerabilities, providing hackers with easy access to computer systems via browser-based attacks. Browser security efforts that re...
Chris Grier, Shuo Tang, Samuel T. King