Open Access. Powered by Scholars. Published by Universities.®

OS and Networks Commons

Open Access. Powered by Scholars. Published by Universities.®

1,591 Full-Text Articles 1,444 Authors 267,473 Downloads 85 Institutions

All Articles in OS and Networks

Faceted Search

1,591 full-text articles. Page 53 of 53.

Linked Open Social Signals, Pablo N. Mendes, Alexandre Passant, Pavan Kapanipathi, Amit P. Sheth 2010 Wright State University - Main Campus

Linked Open Social Signals, Pablo N. Mendes, Alexandre Passant, Pavan Kapanipathi, Amit P. Sheth

Kno.e.sis Publications

In this paper we discuss the collection, semantic annotation and analysis of real-time social signals from micro-blogging data. We focus on users interested in analyzing social signals collectively for sensemaking. Our proposal enables flexibility in selecting subsets for analysis, alleviating information overload. We define an architecture that is based on state-of-the-art Semantic Web technologies and a distributed publish subscribe protocol for real time communication. In addition, we discuss our method and application in a scenario related to the health care reform in the United States.


Embedded Systems As Datacenters, Robert Iannucci 2009 RAI Laboratory LLC

Embedded Systems As Datacenters, Robert Iannucci

Robert A Iannucci

No abstract provided.


Integrating Software Assurance Into The Software Development Life Cycle (Sdlc), Maurice Dawson, Darrell N. Burrell, Emad Rahim, Stephen Brewster 2009 Oklahoma State University - Main Campus

Integrating Software Assurance Into The Software Development Life Cycle (Sdlc), Maurice Dawson, Darrell N. Burrell, Emad Rahim, Stephen Brewster

Maurice Dawson

This article examines the integration of secure coding practices into the overall Software Development Life Cycle (SDLC). Also detailed is a proposed methodology for integrating software assurance into the Department of Defense Information Assurance Certification & Accreditation Process (DIACAP). This method for integrating software assurance helps in properly securing the application layer as that is where more than half of the vulnerabilities lie in a system.


Digital Commons powered by bepress