Sciweavers

341 search results - page 64 / 69
» User Level Communication on Alpha Linux Systems
Sort
View
EUROSYS
2009
ACM
14 years 4 months ago
Pointless tainting?: evaluating the practicality of pointer tainting
This paper evaluates pointer tainting, an incarnation of Dynamic Information Flow Tracking (DIFT), which has recently become an important technique in system security. Pointer tai...
Asia Slowinska, Herbert Bos
MIE
2008
128views Healthcare» more  MIE 2008»
13 years 9 months ago
Interface Terminologies: Bridging the Gap between Theory and Reality for Africa
In the United States and Europe, electronic health records (EHRs) allow information technology and decision-support to facilitate the activities of clinicians and are considered a...
Andrew S. Kanter, Amy Y. Wang, Fred E. Masarie Jr....
SAINT
2002
IEEE
14 years 21 days ago
Service Emergence based on Relationship among Self-Organizing Entities
In this paper, we describe the Jack-in-the-Net (Ja-Net) architecture for adaptive services in a large scale, open network environment. Using biologically inspired concepts, Ja-Net...
Tomoko Itao, Tetsuya Nakamura, Masato Matsuo, Tats...
JSS
2011
114views more  JSS 2011»
12 years 10 months ago
An approach to process continuous location-dependent queries on moving objects with support for location granules
Location-based services have attracted the attention of important research in the field of mobile computing. Specifically, different mechanisms have been proposed to process loc...
Sergio Ilarri, Carlos Bobed, Eduardo Mena
ICPR
2002
IEEE
14 years 22 days ago
Biometric Hash based on Statistical Features of Online Signatures
This paper presents a new approach to generate biometric hash values based on statistical features in online signature signals. Whilst the output of typical online signature verif...
Claus Vielhauer, Ralf Steinmetz, Astrid Mayerh&oum...