Sciweavers

621 search results - page 68 / 125
» Security of Internet Location Management
Sort
View
161
Voted
TASE
2010
IEEE
14 years 10 months ago
Clear and Precise Specification of Ecological Data Management Processes and Dataset Provenance
Abstract--With the availability of powerful computational and communication systems, scientists now readily access large, complicated derived datasets and build on those results to...
Leon J. Osterweil, Lori A. Clarke, Aaron M. Elliso...
121
Voted
WWW
2006
ACM
16 years 4 months ago
FLUX: fuzzy content and structure matching of XML range queries
An XML range query may impose predicates on the numerical or textual contents of the elements and/or their respective path structures. In order to handle content and structure ran...
Hua-Gang Li, S. Alireza Aghili, Divyakant Agrawal,...
124
Voted
DATE
2009
IEEE
133views Hardware» more  DATE 2009»
15 years 10 months ago
SecBus: Operating System controlled hierarchical page-based memory bus protection
—This paper presents a new two-levels page-based memory bus protection scheme. A trusted Operating System drives a hardware cryptographic unit and manages security contexts for e...
Lifeng Su, Stephan Courcambeck, Pierre Guillemin, ...
ISI
2006
Springer
15 years 4 months ago
The Hats Simulator and Colab: An Integrated Information Fusion Challenge Problem and Collaborative Analysis Environment
We present an overview of our work in information fusion for intelligence analysis. This work includes the Hats Simulator and the COLAB system. The Hats Simulator is a parameterize...
Clayton T. Morrison, Paul R. Cohen
WISTP
2010
Springer
15 years 11 months ago
Fraud Detection for Voice over IP Services on Next-Generation Networks
The deployment of Next-Generation Networks (NGN) is a challenge that requires integrating heterogeneous services into a global system of All-IP telecommunications. These networks c...
Igor Ruiz-Agundez, Yoseba K. Penya, Pablo Garcia B...