Sciweavers

2337 search results - page 394 / 468
» Threat-Driven Architectural Design of Secure Information Sys...
Sort
View
MICRO
2009
IEEE
129views Hardware» more  MICRO 2009»
14 years 2 months ago
Execution leases: a hardware-supported mechanism for enforcing strong non-interference
High assurance systems such as those found in aircraft controls and the financial industry are often required to handle a mix of tasks where some are niceties (such as the contro...
Mohit Tiwari, Xun Li, Hassan M. G. Wassel, Frederi...
DGO
2008
112views Education» more  DGO 2008»
13 years 8 months ago
Mapping theory to practice: a cartographic analysis of public safety networks
This paper provides an interim report on ongoing data collection and analysis efforts as part of a large-scale study of information technology- focused interagency collaborations ...
Christine B. Williams, M. Lynne Markus, Michael Ty...
GIS
2008
ACM
14 years 8 months ago
GISolve toolkit: advancing GIS through cyberinfrastructure
Cyberinfrastructure integrates information and communication technologies to enable high-performance, distributed, and collaborative knowledge discovery, and promises to revolutio...
Shaowen Wang
CLEF
2005
Springer
14 years 1 months ago
The XLDB Group at GeoCLEF 2005
This paper describes our participation at the GeoCLEF 2005 task. We detail the main software components of our Geo-IR system, its adaptation for the participation at GeoCLEF and d...
Nuno Cardoso, Bruno Martins, Marcirio Silveira Cha...
HT
2003
ACM
14 years 29 days ago
User-controlled link adaptation
This paper introduces an adaptable hypermedia approach applied to adaptive link annotation techniques. This approach suggests that the combination of direct manipulation with auto...
Theophanis Tsandilas, Monica M. C. Schraefel