-
1
-
-
35048881580
-
The Lorel query language for semistructured data
-
ABITEBOUL, S., QUASS, D., MCHUGH, J., WIDOM, J., AND WIENER, J. L. The Lorel query language for semistructured data. International Journal on Digital Libraries 1, 1 (1997), 68-88.
-
(1997)
International Journal on Digital Libraries
, vol.1
, Issue.1
, pp. 68-88
-
-
Abiteboul, S.1
Quass, D.2
McHugh, J.3
Widom, J.4
Wiener, J.L.5
-
2
-
-
33750057367
-
Provenance collection support in the Kepler scientific workflow system
-
of LNCS, Springer
-
ALTINTAS, I., BARNEY, O., AND JAEGER-FRANK, E. Provenance collection support in the Kepler scientific workflow system. In IPAW (2006), vol. 4145 of LNCS, Springer.
-
(2006)
IPAW
, vol.4145
-
-
Altintas, I.1
Barney, O.2
Jaeger-Frank, E.3
-
5
-
-
77952259672
-
Causeway: Operating system support for controlling and analyzing the execution of distributed programs
-
CHANDA, A., ELMELEEGY, K., COX, A. L., AND ZWAENEPOEL, W. Causeway: operating system support for controlling and analyzing the execution of distributed programs. In HOTOS (2005).
-
(2005)
HOTOS
-
-
Chanda, A.1
Elmeleegy, K.2
Cox, A.L.3
Zwaenepoel, W.4
-
6
-
-
84885664275
-
Labels and event processes in the asbestos operating system
-
EFSTATHOPOULOS, P., KROHN, M., VANDEBOGART, S., FREY, C., ZIEGLER, D., KOHLER, E., MAZIÈRES, D., KAASHOEK, F., AND MORRIS, R. Labels and event processes in the asbestos operating system. In SOSP (2005).
-
(2005)
SOSP
-
-
Efstathopoulos, P.1
Krohn, M.2
Vandebogart, S.3
Frey, C.4
Ziegler, D.5
Kohler, E.6
Mazières, D.7
Kaashoek, F.8
Morris, R.9
-
7
-
-
80052989662
-
X-trace: A pervasive network tracing framework
-
In
-
FONSECA, R., PORTER, G., KATZ, R. H., SHENKER, S., AND STOICA, I. X-trace: A pervasive network tracing framework. In In NSDI (2007).
-
(2007)
NSDI
-
-
Fonseca, R.1
Porter, G.2
Katz, R.H.3
Shenker, S.4
Stoica, I.5
-
9
-
-
42549100305
-
The virtual data grid: A new model and architecture for data-intensive collaboration
-
Asilomar, CA, Jan
-
FOSTER, I., VOECKLER, J., WILDE, M., AND ZHAO, Y. The Virtual Data Grid: A New Model and Architecture for Data-Intensive Collaboration. In CIDR (Asilomar, CA, Jan. 2003).
-
(2003)
CIDR
-
-
Foster, I.1
Voeckler, J.2
Wilde, M.3
Zhao, Y.4
-
10
-
-
85080579386
-
-
GenePattern. http://www.broad.mit.edu/cancer/software/genepattern.
-
-
-
-
11
-
-
84885588230
-
The Taser intrusion recovery system
-
GOEL, A., PO, K., FARHADI, K., LI, Z., AND DE LARA, E. The Taser intrusion recovery system. In SOSP (2005).
-
(2005)
SOSP
-
-
Goel, A.1
Po, K.2
Farhadi, K.3
Li, Z.4
De Lara, E.5
-
12
-
-
43749085907
-
EcrypTFS: An enterprise-class encrypted filesystem for linux
-
HALCROW, M. A. eCryptfs: An enterprise-class encrypted filesystem for linux. Ottawa Linux Symposium (2005).
-
(2005)
Ottawa Linux Symposium
-
-
Halcrow, M.A.1
-
13
-
-
85062006160
-
The case of the fake Picasso: Preventing history forgery with secure provenance
-
HASAN, R., SION, R., AND WINSLETT, M. The Case of the Fake Picasso: Preventing History Forgery with Secure Provenance. In FAST (2009).
-
(2009)
FAST
-
-
Hasan, R.1
Sion, R.2
Winslett, M.3
-
14
-
-
4544225295
-
-
Technical Report 168, Compaq Systems Research Center, March
-
HEYDON, A., LEVIN, R., MANN, T., AND YU, Y. The Vesta Approach to Software Configuration Management. Technical Report 168, Compaq Systems Research Center, March 2001.
-
(2001)
The Vesta Approach to Software Configuration Management
-
-
Heydon, A.1
Levin, R.2
Mann, T.3
Yu, Y.4
-
16
-
-
84860597327
-
A data model and query language suitable for provenance
-
HOLLAND, D. A., BRAUN, U., MACLEAN, D., MUNISWAMY-REDDY, K.-K., AND SELTZER, M. I. A Data Model and Query Language Suitable for Provenance. In Proceedings of the 2008 International Provenance and Annotation Workshop (IPAW).
-
Proceedings of the 2008 International Provenance and Annotation Workshop (IPAW)
-
-
Holland, D.A.1
Braun, U.2
Maclean, D.3
Muniswamy-Reddy, K.-K.4
Seltzer, M.I.5
-
17
-
-
10644279224
-
Backtracking intrusions
-
Bolton Landing, NY, October
-
KING, S. T., AND CHEN, P. M. Backtracking Intrusions. In SOSP (Bolton Landing, NY, October 2003).
-
(2003)
SOSP
-
-
King, S.T.1
Chen, P.M.2
-
18
-
-
57749192483
-
Information flow control for standard OS abstractions
-
KROHN, M., YIP, A., BRODSKY, M., CLIFFER, N., KAASHOEK, M. F., KOHLER, E., AND MORRIS, R. Information flow control for standard OS abstractions. In symposium on Operating systems principles (2007).
-
(2007)
Symposium on Operating Systems Principles
-
-
Krohn, M.1
Yip, A.2
Brodsky, M.3
Cliffer, N.4
Kaashoek, M.F.5
Kohler, E.6
Morris, R.7
-
21
-
-
85076227002
-
Provenance-aware storage systems
-
MUNISWAMY-REDDY, K.-K., HOLLAND, D. A., BRAUN, U., AND SELTZER, M. Provenance-aware storage systems. In Proceedings of the 2006 USENIX Annual Technical Conference.
-
Proceedings of the 2006 USENIX Annual Technical Conference
-
-
Muniswamy-Reddy, K.-K.1
Holland, D.A.2
Braun, U.3
Seltzer, M.4
-
22
-
-
27544444280
-
Dynamic taint analysis for automatic detection, analysis, and signature generation of exploits on commodity software
-
NEWSOME, J., AND SONG, D. X. Dynamic taint analysis for automatic detection, analysis, and signature generation of exploits on commodity software. In NDSS (2005).
-
(2005)
NDSS
-
-
Newsome, J.1
Song, D.X.2
-
26
-
-
12844250119
-
-
April
-
SHEPLER, S., CALLAGHAN, B., ROBINSON, D., THURLOW, R., BEAME, C., EISLER, M., AND NOVECK, D. Network File System (NFS) version 4 Protocol. http://www.ietf.org/rfc/rfc3530.txt, April 2003.
-
(2003)
Network File System (NFS) Version 4 Protocol
-
-
Shepler, S.1
Callaghan, B.2
Robinson, D.3
Thurlow, R.4
Beame, C.5
Eisler, M.6
Noveck, D.7
-
29
-
-
84858835658
-
Trio: A system for integrated management of data, accuracy, and lineage
-
Asilomar, CA, January
-
WIDOM, J. Trio: A System for Integrated Management of Data, Accuracy, and Lineage. In CIDR (Asilomar, CA, January 2005).
-
(2005)
CIDR
-
-
Widom, J.1
-
30
-
-
77950788046
-
Panorama: Capturing system-wide information flow for malware detection and analysis
-
YIN, H., SONG, D., EGELE, M., KRUEGEL, C., AND KIRDA, E. Panorama: capturing system-wide information flow for malware detection and analysis. In CCS (2007).
-
(2007)
CCS
-
-
Yin, H.1
Song, D.2
Egele, M.3
Kruegel, C.4
Kirda, E.5
-
31
-
-
84888352157
-
Making information flow explicit in histar
-
ZELDOVICH, N., BOYD-WICKIZER, S., KOHLER, E., AND MAZIÈRES, D. Making information flow explicit in histar. In OSDI (2006).
-
(2006)
OSDI
-
-
Zeldovich, N.1
Boyd-Wickizer, S.2
Kohler, E.3
Mazières, D.4
|