Sciweavers

1597 search results - page 299 / 320
» Securing Wireless Data: System Architecture Challenges
Sort
View
ICDE
2007
IEEE
170views Database» more  ICDE 2007»
14 years 9 months ago
Tree-Pattern Similarity Estimation for Scalable Content-based Routing
With the advent of XML as the de facto language for data publishing and exchange, scalable distribution of XML data to large, dynamic populations of consumers remains an important...
Raphaël Chand, Pascal Felber, Minos N. Garofa...
CONCURRENCY
2002
152views more  CONCURRENCY 2002»
13 years 7 months ago
The Legion Grid Portal
-- The Legion Grid Portal is an interface to a grid system. Users interact with the portal, and hence a grid through an intuitive interface from which they can view files, submit a...
Anand Natrajan, Anh Nguyen-Tuong, Marty Humphrey, ...
PODS
2005
ACM
136views Database» more  PODS 2005»
14 years 7 months ago
Context-sensitive program analysis as database queries
Program analysis has been increasingly used in software engineering tasks such as auditing programs for security vulnerabilities and finding errors in general. Such tools often re...
Monica S. Lam, John Whaley, V. Benjamin Livshits, ...
EUROSYS
2009
ACM
14 years 4 months ago
Pointless tainting?: evaluating the practicality of pointer tainting
This paper evaluates pointer tainting, an incarnation of Dynamic Information Flow Tracking (DIFT), which has recently become an important technique in system security. Pointer tai...
Asia Slowinska, Herbert Bos
DILS
2005
Springer
14 years 1 months ago
PLATCOM: Current Status and Plan for the Next Stages
We have been developing a system for comparing multiple genomes, PLATCOM, where users can choose genomes of their choice freely and perform analysis of the selected genomes with a...
Kwangmin Choi, Jeong-Hyeon Choi, Amit Saple, Zhipi...