Sciweavers

356 search results - page 63 / 72
» The human infrastructure of cyberinfrastructure
Sort
View
CCS
2009
ACM
14 years 8 months ago
Automatic discovery of botnet communities on large-scale communication networks
Botnets are networks of compromised computers infected with malicious code that can be controlled remotely under a common command and control (C&C) channel. Recognized as one ...
Wei Lu, Mahbod Tavallaee, Ali A. Ghorbani
POPL
2008
ACM
14 years 8 months ago
From dirt to shovels: fully automatic tool generation from ad hoc data
An ad hoc data source is any semistructured data source for which useful data analysis and transformation tools are not readily available. Such data must be queried, transformed a...
Kathleen Fisher, David Walker, Kenny Qili Zhu, Pet...
CCS
2009
ACM
14 years 2 months ago
A practical property-based bootstrap architecture
Binary attestation, as proposed by the Trusted Computing Group (TCG), is a pragmatic approach for software integrity protection and verification. However, it has also various sho...
René Korthaus, Ahmad-Reza Sadeghi, Christia...
ESWS
2009
Springer
14 years 2 months ago
CultureSampo: A National Publication System of Cultural Heritage on the Semantic Web 2.0
CULTURESAMPO is an application demonstration of a national level publication system of cultural heritage contents on the Web, based on ideas and technologies of the Semantic (Web a...
Eero Hyvönen, Eetu Mäkelä, Tomi Kau...
PETRA
2009
ACM
14 years 2 months ago
Ambient kitchen: designing situated services using a high fidelity prototyping environment
The Ambient Kitchen is a high fidelity prototype for exploring the design of pervasive computing algorithms and applications for everyday environments. The environment integrates ...
Patrick Olivier, Guangyou Xu, Andrew Monk, Jesse H...