Sciweavers

2740 search results - page 415 / 548
» Typing the Specialization Interface
Sort
View
120
Voted
ACSC
2005
IEEE
15 years 9 months ago
Flexible Exclusion Control for Composite Objects
We present a simple approach for implementing flexible locking strategies in a system of components, which may themselves be composite objects. The approach is flexible in that a ...
Abdelsalam Shanneb, John Potter
141
Voted
CSB
2005
IEEE
133views Bioinformatics» more  CSB 2005»
15 years 9 months ago
Creating a Protein Ontology Resource
Protein Data Integration approaches at the moment considers data sources as data repositories, but not as applications; which in turn may embody complex interactions with other da...
Amandeep S. Sidhu, Tharam S. Dillon, Elizabeth Cha...
DSN
2005
IEEE
15 years 9 months ago
Detecting Stealth Software with Strider GhostBuster
Stealth malware programs that silently infect enterprise and consumer machines are becoming a major threat to the future of the Internet [XZ04]. Resource hiding is a powerful stea...
Yi-Min Wang, Doug Beck, Binh Vo, Roussi Roussev, C...
127
Voted
SAINT
2005
IEEE
15 years 9 months ago
Turning Web Applications into Portlets: Raising the Issues
A portal is a key component of an enterprise integration strategy. It provides integration at the user interface level, whereas other integration technologies support business pro...
Oscar Díaz, Iñaki Paz
119
Voted
MM
2005
ACM
97views Multimedia» more  MM 2005»
15 years 9 months ago
Recognition of hands-free speech and hand pointing action for conversational TV
In this paper, we propose a structure and components of a conversational television set(TV) to which we can ask anything on the broadcasted contents and receive the interesting in...
Yasuo Ariki, Tetsuya Takiguchi, Atsushi Sako