Sciweavers

449 search results - page 18 / 90
» Protecting the Hosted Application Server
Sort
View
IHI
2012
266views Healthcare» more  IHI 2012»
12 years 3 months ago
A software tool for large-scale sharing and querying of clinical documents modeled using HL7 version 3 standard
We present a novel software tool called CDN (Collaborative Data Network) for large-scale sharing and querying of clinical documents modeled using HL7 v3 standard (e.g., Clinical D...
Praveen R. Rao, Tivakar Komara Swami, Deepthi S. R...
ISCAS
2005
IEEE
152views Hardware» more  ISCAS 2005»
14 years 1 months ago
Robust watermarking of music signals by cepstrum modification
— A method of embedding a predetermined watermark in an audio signal is described for audio music copyright protection applications. The proposed technique applies the psychoacou...
Kaliappan Gopalan
ECOOPW
1999
Springer
14 years 1 days ago
J-Kernel: A Capability-Based Operating System for Java
Safe language technology can be used for protection within a single address space. This protection is enforced by the language’s type system, which ensures that references to obj...
Thorsten von Eicken, Chi-Chao Chang, Grzegorz Czaj...
USENIX
2008
13 years 10 months ago
Vx32: Lightweight User-level Sandboxing on the x86
Code sandboxing is useful for many purposes, but most sandboxing techniques require kernel modifications, do not completely isolate guest code, or incur substantial performance co...
Bryan Ford, Russ Cox
COOPIS
2002
IEEE
14 years 22 days ago
Reconciling Replication and Transactions for the End-to-End Reliability of CORBA Applications
Abstract. The CORBA standard now incorporates support for reliability through two distinct mechanisms — replication (using the Fault Tolerant CORBA standard) and transactions (us...
Pascal Felber, Priya Narasimhan