Sciweavers

1216 search results - page 192 / 244
» Translation analysis and translation automation
Sort
View
SOSP
2007
ACM
14 years 4 months ago
Secure virtual architecture: a safe execution environment for commodity operating systems
This paper describes an efficient and robust approach to provide a safe execution environment for an entire operating system, such as Linux, and all its applications. The approach...
John Criswell, Andrew Lenharth, Dinakar Dhurjati, ...
CSCW
2010
ACM
14 years 4 months ago
Characteristics of shared health reflections in a local community
We performed a content analysis of the information shared in a locally and culturally focused health application, EatWell. In EatWell, information is shared via the creation of au...
Andrea Grimes, Brian M. Landry, Rebecca E. Grinter
IDTRUST
2010
ACM
14 years 2 months ago
Computational techniques for increasing PKI policy comprehension by human analysts
Natural-language policies found in X.509 PKI describe an organization’s stated policy as a set of requirements for trust. The widespread use of X.509 underscores the importance ...
Gabriel A. Weaver, Scott A. Rea, Sean W. Smith
CASON
2009
IEEE
14 years 2 months ago
Social Aspects of Web Page Contents
In this paper we try to consider a Web page as information with social aspects. Each Web page is the result of invisible social interaction. This interaction between different gro...
Milos Kudelka, Václav Snásel, Zdenek...
ICC
2009
IEEE
190views Communications» more  ICC 2009»
14 years 2 months ago
Decomposition for Low-Complexity Near-Optimal Routing in Multi-Hop Wireless Networks
Abstract—Network flow models serve as a popular mathematical framework for the analysis and optimization of Multi-hop Wireless Networks. They also serve to provide the understan...
Vinay Kolar, Nael B. Abu-Ghazaleh, Petri Mäh&...