Filters








330,977 Hits in 4.6 sec

The Architecture and Implementation of an Extensible Web Crawler

Jonathan M. Hsieh, Steven D. Gribble, Henry M. Levy
2010 Symposium on Networked Systems Design and Implementation  
a page against millions of filters, and the use of document and filter partitioning to scale our prototype implementation to high document throughput and large numbers of filters.  ...  We focus on the challenges and trade-offs in the system, such as the design of a filter language that is simultaneously expressive and efficient to execute, the use of filter indexing to cheaply match  ...  on drafts of this paper.  ... 
dblp:conf/nsdi/HsiehGL10 fatcat:2oblly7iljf2bmq55hvjbprviy

A Quantitative Approach to Analyze Modifiability in Software Architectural Design of Agile Application Systems

Milu Philip
2020 Information Technology and Control  
The present-day software application systems require a high degree of agility during development and operational phases due to the advancements in software technologies and also because of the need to  ...  The model has been tested successfully for a prototype document processing application system.  ...  The document processing application system reads a collection of input documents in a continuous stream mode, applies appropriate filter programs in a given order and finally transforms them into an output  ... 
doi:10.5755/j01.itc.49.2.22893 fatcat:js732kieovehjmxyoaklpeozni

What You See Is What You Sign [chapter]

Karl Scheibelhofer
2001 IFIP Advances in Information and Communication Technology  
The application focuses on systems that are used for signing and verification, because trustworthy display is of particular interest in the area of electronic signatures.  ...  Such advanced filtering techniques can ensure a maximum of security for displaying documents. A system built on this approach could assist the user much more than traditional systems can.  ...  Consequently, the operating system must verify the signature of an application before it executes it. In some situations, it is enough to verify the signature during installation of the software.  ... 
doi:10.1007/978-0-387-35413-2_1 fatcat:xpassir3pffe7exyydbazvcii4

A Run-time System for Efficient Execution of Scientific Workflows on Distributed Environments

George Teodoro, Tulio Tavares, Renato Ferreira, Tahsin Kurc, Wagner Meira, Dorgival Guedes, Tony Pan, Joel Saltz
2008 International journal of parallel programming  
The design of these systems is largely based on the observation that data analysis applications can be composed as pipelines or networks of computations on data.  ...  In this work, we present a runtime support system that is designed to facilitate this type of computation in distributed computing environments.  ...  This operation will then invoke a request to the local WFMDM instance for an available document for processing, and will receive an ID of some document, potentially available locally.  ... 
doi:10.1007/s10766-007-0068-8 pmid:22582009 pmcid:PMC3348585 fatcat:cmkw7szgibd4loss4sbmsdbtpm

A computer-based system to support forensic studies on handwritten documents

Katrin Franke, Mario Köppen
2001 International Journal on Document Analysis and Recognition  
The framework is realized as an assistance system for forensic handwriting experts and it is in use by the Bundeskriminalamt, the federal police bureau in Germany, for one and a half years.  ...  Also, results of the framework-application will be given.  ...  This work was sponsored in part by the Bundeskriminalamt, section handwriting examination (GZ.:IX/B-2310297-Ge).  ... 
doi:10.1007/pl00013565 fatcat:tjozangj7ngy3faiymn7svev2a

The design of a document database

Chris Clifton, Hector Garcie-Molina
1988 Proceedings of the ACM conference on Document processing systems - DOCPROCS '88  
In this paper a Document Base Management System is proposed that incorporates conventional database and hypertext ideas into a document database.  ...  The Document Base operates as a server, users access the database through different application programs. The query language which applications use to retrieve documents is described.  ...  Acknowledgements Some of the ideas described in this paper were initially developed at Xerox P.A.R.C. in discussions with Jack Kent, Derek Oppen, and the authors.  ... 
doi:10.1145/62506.62528 fatcat:ft4myujx7vcipcqmwzrt3ecdc4

HAM

Brad Campbell, Joseph M. Goodman
1987 Proceeding of the ACM conference on Hypertext - HYPERTEXT '87  
The storage system consists of a collection of contexts, nodes, links, and attributes that make up a hypertext graph.  ...  The Hypertext Abstract Machine (HAM) is a general-purpose, transaction-based, server for a hypertext storage system. The sewer is designed to handle mult@e users in a networked environment.  ...  We wish to thank Norm Delisle and Mayer Schwartz of the Tektronix Computer Research Laboratory for their helpful comments.  ... 
doi:10.1145/317426.317429 dblp:conf/ht/CampbellG87 fatcat:k3byrj5jrjfavcrkvizhmujrlq

Chronicle

Tovi Grossman, Justin Matejka, George Fitzmaurice
2010 Proceedings of the 23nd annual ACM symposium on User interface software and technology - UIST '10  
We outline some of the challenges surrounding the development of such a system, and then describe our implementation within an image editing application.  ...  We describe Chronicle, a new system that allows users to explore document workflow histories.  ...  In contrast, an application independent operation browser was recently developed by Nakamura et al. [33] .  ... 
doi:10.1145/1866029.1866054 dblp:conf/uist/GrossmanMF10 fatcat:55gwzt65r5gznimlovzx72furi

A Multi-Agent Model for Content-Based Electronic Document Filtering [chapter]

N. S. Papaspyrou, C. E. Sgouropoulou, E. S. Skordalakis, A. V. Gerbessiotis, P. Livadas
1999 Advances in Intelligent Systems  
Acknowledgements This research work is funded by the Greek General Secretariat of Research and Technology, as part of the Programme for Supporting Research ( ENE 95) -Project #463.  ...  The information seeking agent is not a part of the document filtering system.  ...  The choice of operators and j j j j, as well as of the negation operator must be made in an appropriate way, so that some properties are satisfied.  ... 
doi:10.1007/978-94-011-4840-5_7 fatcat:febf7hieu5gv3gzx4c4kgbbmeu

CODEX: Content-Oriented Data EXchange Model on CORBA

Yue-Shan Chang, Ruey-Shyang Wu, Kai-Chih Liang, Shyan-Ming Yuan, Magic Yang
2003 Computer Standards & Interfaces  
The CODEX system equips functions of primitive data type checking, message classification, content filtering and source/destination screening.  ...  Application developers can focus more on business functions, instead of caring about the detail of data exchange.  ...  It is necessary, in an EDI environment, to check the data type of incoming documents in order to reduce the possibility of missed operations.  ... 
doi:10.1016/s0920-5489(03)00006-0 fatcat:phcoquavgvfjfogkpsfmvwkcci

The Secure Pipes and Filters Pattern

Eduardo B. Fernandez, Jorge L. Ortega-Arjona
2009 2009 20th International Workshop on Database and Expert Systems Application  
Many applications process or transform a stream of data. Such applications are organized as a sequence of different stages, which may be independent enough to be simultaneously carried out.  ...  The Secure Pipes and Filters pattern includes ways to add security controls at each stage of processing, controlling that only predefined operations are applied to data streams, as well as securing data  ...  Figure 3 shows the use case where a subject with a specific role tries to execute an operation, op3, on a document.  ... 
doi:10.1109/dexa.2009.55 dblp:conf/dexaw/FernandezO09 fatcat:4sztszcfxfcbfimswz2e2swdxe

In Guards We Trust: Security and Privacy in Operating Systems Revisited

Michael Hanspach, Jorg Keller
2013 2013 International Conference on Social Computing  
We further provide a typology of operating system guards, which are essentially trusted components utilizing different compilations of input and output filters.  ...  We provide a collection of output filters that can be applied to trusted operating system components to enforce higher level security goals.  ...  By the definition of an operating system guard (see Section III), a guard can utilize one or more filters in order to protect other operating system components and application partitions. In Tab.  ... 
doi:10.1109/socialcom.2013.87 dblp:conf/socialcom/HanspachK13 fatcat:kuxgjhjhzbe6pegvbz4snwv6g4

Automated extraction of behavioural profiles from document usage

S. D. Wolthusen
2007 BT technology journal  
In this paper we describe a mechanism for the instrumentation of operating systems to obtain information on the documents and resources accessed by arbitrary processes.  ...  Such a mechanism could be an important component of the infrastructure of an operational risk management system, generating an audit trail for compliance and forensic investigation, and acting as a sensor  ...  Acknowledgments Parts of the research reported here were conducted while the author was at the Norwegian Information Security Laboratory of Gjøvik University College, Norway and Fraunhofer-IGD, Darmstadt  ... 
doi:10.1007/s10550-007-0020-x fatcat:rjzy5t2zija5ri6agqpv6xsnb4

Capture – A behavioral analysis tool for applications and documents

Christian Seifert, Ramon Steenson, Ian Welch, Peter Komisarczuk, Barbara Endicott-Popovsky
2007 Digital Investigation. The International Journal of Digital Forensics and Incident Response  
Forensics Behavioral analysis Application analysis Document analysis a b s t r a c t In this paper, we present Capture, a tool for behavioral analysis of applications for the Win32 operating system family  ...  Capture is able to monitor the state of a system during the execution of applications and processing of documents, which provides the analyst with insights on how the software operates even if no source  ...  Acknowledgements We would like to thank Manuel Fries from Rising Antivirus, Ltd. in providing us with a malware sample that we used in our sample analysis. r e f e r e n c e s  ... 
doi:10.1016/j.diin.2007.06.003 fatcat:oxj2xlnz5zerjeojcxkhlkpejm

Providing awareness in multi-synchronous collaboration without compromising privacy

Claudia-Lavinia Ignat, Stavroula Papadopoulou, Gérald Oster, Moira C. Norrie
2008 Proceedings of the ACM 2008 conference on Computer supported cooperative work - CSCW '08  
When involved in collaborative tasks, users often choose to use multi-synchronous applications in order to concurrently work in isolation.  ...  The computation of awareness is based on metrics that measure the effect of changes for the different types of changes, on the different syntactic document levels and document parts.  ...  An operation is filtered according to various filters depending on the privacy relation of the local user with the remote one.  ... 
doi:10.1145/1460563.1460665 dblp:conf/cscw/IgnatPON08 fatcat:i4wnevxcyrakbk6jm6hgk2d5tm
« Previous Showing results 1 — 15 out of 330,977 results