Sciweavers

5904 search results - page 1135 / 1181
» Requirements for a Composition Language
Sort
View
SACMAT
2006
ACM
14 years 1 months ago
Traust: a trust negotiation-based authorization service for open systems
In recent years, trust negotiation (TN) has been proposed as a novel access control solution for use in open system environments in which resources are shared across organizationa...
Adam J. Lee, Marianne Winslett, Jim Basney, Von We...
VEE
2006
ACM
142views Virtualization» more  VEE 2006»
14 years 1 months ago
Secure and practical defense against code-injection attacks using software dynamic translation
One of the most common forms of security attacks involves exploiting a vulnerability to inject malicious code into an executing application and then cause the injected code to be ...
Wei Hu, Jason Hiser, Daniel Williams, Adrian Filip...
CODES
2005
IEEE
14 years 1 months ago
Aggregating processor free time for energy reduction
Even after carefully tuning the memory characteristics to the application properties and the processor speed, during the execution of real applications there are times when the pr...
Aviral Shrivastava, Eugene Earlie, Nikil D. Dutt, ...
ICDCSW
2005
IEEE
14 years 1 months ago
DiamondHelp: A Collaborative Interface Framework for Networked Home Appliances
DiamondHelp is a reusable Java framework for building graphical user interfaces based on the collaborative paradigm of human-computer interaction. DiamondHelp´s graphical design ...
Charles Rich, Candy L. Sidner, Neal Lesh, Andrew G...
SIGIR
2005
ACM
14 years 1 months ago
A probabilistic model for retrospective news event detection
Retrospective news event detection (RED) is defined as the discovery of previously unidentified events in historical news corpus. Although both the contents and time information...
Zhiwei Li, Bin Wang, Mingjing Li, Wei-Ying Ma
« Prev « First page 1135 / 1181 Last » Next »