Sciweavers

8689 search results - page 1431 / 1738
» Software: hard data
Sort
View
133
Voted
ACSAC
2007
IEEE
15 years 11 months ago
Channels: Runtime System Infrastructure for Security-Typed Languages
Security-typed languages (STLs) are powerful tools for provably implementing policy in applications. The programmer maps policy onto programs by annotating types with information ...
Boniface Hicks, Tim Misiak, Patrick McDaniel
156
Voted
ACSAC
2007
IEEE
15 years 11 months ago
The Design and Development of an Undercover Multipurpose Anti-spoofing Kit (UnMask)
This paper describes the design and development of a software system to support law enforcement in investigating and prosecuting email based crimes. It focuses on phishing scams w...
Sudhir Aggarwal, Jasbinder Bali, Zhenhai Duan, Leo...
144
Voted
DEEC
2007
IEEE
15 years 11 months ago
DeepBot: a focused crawler for accessing hidden web content
The crawler engines of today cannot reach most of the information contained in the Web. A great amount of valuable information is "hidden" behind the query forms of onli...
Manuel Álvarez, Juan Raposo, Alberto Pan, F...
HPDC
2007
IEEE
15 years 11 months ago
Feedback-directed thread scheduling with memory considerations
This paper describes a novel approach to generate an optimized schedule to run threads on distributed shared memory (DSM) systems. The approach relies upon a binary instrumentatio...
Fengguang Song, Shirley Moore, Jack Dongarra
131
Voted
APWEB
2007
Springer
15 years 10 months ago
Managing a Geographic Database from Mobile Devices Through OGC Web Services
We present in this paper a system for the management of geographic databases from mobile devices. The architecture of the system is extensible in the sense that it can be adapted t...
Nieves R. Brisaboa, Miguel Rodríguez Luaces...
« Prev « First page 1431 / 1738 Last » Next »