Sciweavers

6884 search results - page 1274 / 1377
» The macro-structure of use of help
Sort
View
SP
2006
IEEE
148views Security Privacy» more  SP 2006»
14 years 4 months ago
SubVirt: Implementing malware with virtual machines
Attackers and defenders of computer systems both strive to gain complete control over the system. To maximize their control, both attackers and defenders have migrated to low-leve...
Samuel T. King, Peter M. Chen, Yi-Min Wang, Chad V...
DOCENG
2006
ACM
14 years 4 months ago
NEWPAR: an automatic feature selection and weighting schema for category ranking
Category ranking provides a way to classify plain text documents into a pre-determined set of categories. This work proposes to have a look at typical document collections and ana...
Fernando Ruiz-Rico, José Luis Vicedo Gonz&a...
IWCMC
2006
ACM
14 years 4 months ago
Resolving islands of security problem for DNSSEC
The DNS Security Extensions (DNSSEC) were developed to add origin authentication and integrity. DNSSEC defined a public key infrastructure over DNS tree hierarchy for the public ...
Eunjong Kim, Ashish Gupta, Batsukh Tsendjav, Danie...
IWCMC
2006
ACM
14 years 4 months ago
A novel broadcast technique for high-density ad hoc networks
Broadcasting in ad hoc networks is required for many routing and other network-layer protocols to request information like routes or locations about destination nodes. Most of the...
Ai Hua Ho, Alexander J. Aved, Kien A. Hua
JCDL
2006
ACM
151views Education» more  JCDL 2006»
14 years 4 months ago
Tagging of name records for genealogical data browsing
In this paper we present a method of parsing unstructured textual records briefly describing a person and their direct relatives, which we use in the construction of a browsing t...
Mike Perrow, David Barber
« Prev « First page 1274 / 1377 Last » Next »