Sciweavers

2237 search results - page 306 / 448
» Storing information with extractors
Sort
View
SEMWEB
2007
Springer
14 years 5 months ago
Access Control for Sharing Semantic Data across Desktops
Abstract. Personal Information Management (PIM) systems aim to provide convenient access to all data and metadata on a desktop to the user itself as well as the co-workers. Obvious...
Ekaterini Ioannou, Juri Luca De Coi, Arne Wolf Koe...
TACAS
2007
Springer
125views Algorithms» more  TACAS 2007»
14 years 5 months ago
Type-Dependence Analysis and Program Transformation for Symbolic Execution
Symbolic execution can be problematic when applied to real applications. This paper addresses two of these problems: (1) the constraints generated during symbolic execution may be ...
Saswat Anand, Alessandro Orso, Mary Jean Harrold
UCS
2007
Springer
14 years 5 months ago
DroPicks - A Tool for Collaborative Content Sharing Exploiting Everyday Artefacts
Emergence of social web services like YouTube[1], Flickr[2] etc. is constantly transforming the way we share our lifestyles with family, friends and colleagues. The significance of...
Simo Hosio, Fahim Kawsar, Jukka Riekki, Tatsuo Nak...
BROADNETS
2006
IEEE
14 years 5 months ago
Toward a More Practical Marking Scheme for IP Traceback
Probabilistic packet marking (PPM) has been studied as a promising approach to realize IP traceback. In this paper, we propose a new PPM approach that improves the current state o...
Chao Gong, Kamil Saraç
COMSWARE
2006
IEEE
14 years 5 months ago
Remote storage for mobile devices
— The ability to access remote file storage from mobile devices enables a number of new use cases for storing and sharing data. We describe the design and implementation of a Rem...
Jarkko Tolvanen, Tapio Suihko, Jaakko Lipasti, N. ...