Sciweavers

2265 search results - page 413 / 453
» Recovering Exchanged Data
Sort
View
SISW
2005
IEEE
14 years 2 months ago
Towards Protecting Sensitive Files in a Compromised System
Protecting sensitive files from a compromised system helps administrator to thwart many attacks, discover intrusion trails, and fast restore the system to a safe state. However, ...
Xin Zhao, Kevin Borders, Atul Prakash
SEMWEB
2005
Springer
14 years 2 months ago
PR-OWL: A Bayesian Ontology Language for the Semantic Web
This paper addresses a major weakness of current technologies for the Semantic Web, namely the lack of a principled means to represent and reason about uncertainty. This not only h...
Paulo Cesar G. da Costa, Kathryn B. Laskey, Kennet...
VLDB
2005
ACM
126views Database» more  VLDB 2005»
14 years 2 months ago
Hubble: An Advanced Dynamic Folder Technology for XML
A significant amount of information is stored in computer systems today, but people are struggling to manage their documents such that the information is easily found. XML is a de...
Ning Li, Joshua Hui, Hui-I Hsiao, Kevin S. Beyer
MABS
2004
Springer
14 years 2 months ago
Formal Analysis of Meeting Protocols
Organizations depend on regular meetings to carry out their everyday tasks. When carried out successfully, meetings offer a common medium for participants to exchange ideas and mak...
Catholijn M. Jonker, Martijn C. Schut, Jan Treur, ...
SC
2009
ACM
14 years 1 months ago
Plasma fusion code coupling using scalable I/O services and scientific workflows
In order to understand the complex physics of mother nature, physicist often use many approximations to understand one area of physics and then write a simulation to reduce these ...
Norbert Podhorszki, Scott Klasky, Qing Liu, Cipria...