Sciweavers

4231 search results - page 808 / 847
» Using Language More Responsibly
Sort
View
ICDE
2007
IEEE
134views Database» more  ICDE 2007»
15 years 8 months ago
Apply Model Checking to Security Analysis in Trust Management
Trust management is a form of access control that uses delegation to achieve scalability beyond a single organization or federation. However, delegation can be difficult to contr...
Mark Reith, Jianwei Niu, William H. Winsborough
131
Voted
ISCA
2007
IEEE
115views Hardware» more  ISCA 2007»
15 years 8 months ago
VPC prediction: reducing the cost of indirect branches via hardware-based dynamic devirtualization
Indirect branches have become increasingly common in modular programs written in modern object-oriented languages and virtualmachine based runtime systems. Unfortunately, the pred...
Hyesoon Kim, José A. Joao, Onur Mutlu, Chan...
118
Voted
SEMWEB
2007
Springer
15 years 8 months ago
Lightweight Community-Driven Ontology Evolution
Only few well-maintained domain ontologies can be found on the Web. The likely reasons for the lack of useful domain ontologies include that (1) informal means to convey intended m...
Katharina Siorpaes
133
Voted
KCAP
2005
ACM
15 years 8 months ago
Automated story capture from conversational speech
While storytelling has long been recognized as an important part of effective knowledge management in organizations, knowledge management technologies have generally not distingui...
Andrew S. Gordon, Kavita Ganesan
SIGSOFT
2004
ACM
15 years 8 months ago
Resolving uncertainties during trace analysis
Software models provide independent perspectives onto software systems. Ideally, all models should use the same model element to describe the same part of a system. Practically, m...
Alexander Egyed