Sciweavers

403 search results - page 64 / 81
» Rationale and Design of BULK
Sort
View
JCDL
2006
ACM
140views Education» more  JCDL 2006»
14 years 3 months ago
Exploring erotics in Emily Dickinson's correspondence with text mining and visual interfaces
This paper describes a system to support humanities scholars in their interpretation of literary work. It presents a user interface and web architecture that integrates text minin...
Catherine Plaisant, James Rose, Bei Yu, Loretta Au...
JCDL
2006
ACM
116views Education» more  JCDL 2006»
14 years 3 months ago
Enabling exploration: travelers in the middle east archive
In this paper, we describe the Travelers in the Middle East Archive (TIMEA), a digital archive focused on Western explorations in the Middle East between the 18th and early 20th c...
Lisa M. Spiro, Marie Wise, Geneva L. Henry, Chuck ...
MOBICOM
2006
ACM
14 years 3 months ago
WHYNET: a hybrid testbed for large-scale, heterogeneous and adaptive wireless networks
We present an overview of the WHYNET (Wireless HYbrid NETwork) testbed, currently being developed for realistic and scalable evaluation of next-generation wireless network protoco...
Junlan Zhou, Zhengrong Ji, Maneesh Varshney, Zhigu...
MSR
2006
ACM
14 years 3 months ago
Using evolutionary annotations from change logs to enhance program comprehension
Evolutionary annotations are descriptions of how source code evolves over time. Typical source comments, given their static nature, are usually inadequate for describing how a pro...
Daniel M. Germán, Peter C. Rigby, Margaret-...
ACSAC
2005
IEEE
14 years 3 months ago
Building a MAC-Based Security Architecture for the Xen Open-Source Hypervisor
We present the sHype hypervisor security architecture and examine in detail its mandatory access control facilities. While existing hypervisor security approaches aiming at high a...
Reiner Sailer, Trent Jaeger, Enriquillo Valdez, Ra...