Sciweavers

402 search results - page 72 / 81
» The Design and Implementation of Scalable Information Servic...
Sort
View
ICS
2003
Tsinghua U.
14 years 24 days ago
AEGIS: architecture for tamper-evident and tamper-resistant processing
We describe the architecture for a single-chip aegis processor which can be used to build computing systems secure against both physical and software attacks. Our architecture ass...
G. Edward Suh, Dwaine E. Clarke, Blaise Gassend, M...
GEOINFO
2003
13 years 9 months ago
Integrating Telecom Outside Plant Systems through the GML Standard
This paper introduces the Telecommunication Outside Plant Markup Language (TOPML), an OpenGis GML (Geographic Markup Language) application schema designed to describe telecommunica...
Gerson Mizuta Weiss
ICEIS
2009
IEEE
14 years 2 months ago
AgEx: A Financial Market Simulation Tool for Software Agents
Many researchers in the software agent field use the financial domain as a test bed to develop adaptation, cooperation and learning skills of software agents. However, there are no...
Paulo André Lima de Castro, Jaime Sim&atild...
ICDE
2006
IEEE
208views Database» more  ICDE 2006»
14 years 1 months ago
Integrating Databases into the Semantic Web through an Ontology-Based Framework
To realize the Semantic Web, it will be necessary to make existing database content available for emerging Semantic Web applications, such as web agents and services, which use on...
Dejing Dou, Paea LePendu, Shiwoong Kim, Peishen Qi
ACSAC
2010
IEEE
13 years 5 months ago
Spam mitigation using spatio-temporal reputations from blacklist history
IP blacklists are a spam filtering tool employed by a large number of email providers. Centrally maintained and well regarded, blacklists can filter 80+% of spam without having to...
Andrew G. West, Adam J. Aviv, Jian Chang, Insup Le...