Sciweavers

1298 search results - page 239 / 260
» Web Services Analysis: Making Use of Web Service Composition...
Sort
View
ASPLOS
2006
ACM
14 years 1 months ago
Temporal search: detecting hidden malware timebombs with virtual machines
Worms, viruses, and other malware can be ticking bombs counting down to a specific time, when they might, for example, delete files or download new instructions from a public we...
Jedidiah R. Crandall, Gary Wassermann, Daniela A. ...
SIGMETRICS
2008
ACM
179views Hardware» more  SIGMETRICS 2008»
13 years 7 months ago
Xengine: a fast and scalable XACML policy evaluation engine
XACML has become the de facto standard for specifying access control policies for various applications, especially web services. With the explosive growth of web applications depl...
Alex X. Liu, Fei Chen, JeeHyun Hwang, Tao Xie
WETICE
2007
IEEE
14 years 2 months ago
Distributed Technologies for Remote Access of HDF Data
Scientific simulations and experiments use sophisticated data formats to store and access their data. An example of such a format is the Hierarchical Data Format (HDF), commonly u...
Svetlana G. Shasharina, Chuang Li, Nanbor Wang, Ro...
SIGMOD
2005
ACM
161views Database» more  SIGMOD 2005»
14 years 8 months ago
Building data mining solutions with OLE DB for DM and XML for analysis
A data mining component is included in Microsoft SQL Server 2000 and SQL Server 2005, one of the most popular DBMSs. This gives a push for data mining technologies to move from a ...
ZhaoHui Tang, Jamie Maclennan, Pyungchul (Peter) K...
PERCOM
2003
ACM
14 years 7 months ago
Smart Identification Frameworks for Ubiquitous Computing Applications
Abstract. We present our results of the conceptual design and the implementation of ubiquitous computing applications using smart identification technologies. First, we describe su...
Friedemann Mattern, Kay Römer, Thomas Dü...