Sciweavers

689 search results - page 114 / 138
» Program transformations for information personalization
Sort
View
120
Voted
CASES
2004
ACM
15 years 7 months ago
Hardware assisted control flow obfuscation for embedded processors
+ With more applications being deployed on embedded platforms, software protection becomes increasingly important. This problem is crucial on embedded systems like financial transa...
Xiaotong Zhuang, Tao Zhang, Hsien-Hsin S. Lee, San...
WWW
2007
ACM
16 years 3 months ago
Supervised rank aggregation
This paper is concerned with rank aggregation, the task of combining the ranking results of individual rankers at meta-search. Previously, rank aggregation was performed mainly by...
Yu-Ting Liu, Tie-Yan Liu, Tao Qin, Zhiming Ma, Han...
CSFW
2009
IEEE
15 years 9 months ago
Updatable Security Views
Security views are a flexible and effective mechanism for controlling access to confidential information. Rather than allowing untrusted users to access source data directly, th...
J. Nathan Foster, Benjamin C. Pierce, Steve Zdance...
WWW
2005
ACM
16 years 3 months ago
Topic segmentation of message hierarchies for indexing and navigation support
Message hierarchies in web discussion boards grow with new postings. Threads of messages evolve as new postings focus within or diverge from the original themes of the threads. Th...
Jong Wook Kim, K. Selçuk Candan, Mehmet Emi...
134
Voted
KI
2004
Springer
15 years 7 months ago
SmartWeb: Mobile Applications of the Semantic Web
Abstract Recent progress in mobile broadband communication and semantic web technology is enabling innovative internet services that provide advanced personalization and localizati...
Wolfgang Wahlster