Sciweavers

IFIPTM
2010
113views Management» more  IFIPTM 2010»
13 years 3 months ago
Impact of Trust Management and Information Sharing to Adversarial Cost in Ranking Systems
Ranking systems such as those in product review sites and recommender systems usually use ratings to rank favorite items based on both their quality and popularity. Since higher ra...
Le-Hung Vu, Thanasis G. Papaioannou, Karl Aberer
IFIPTM
2010
139views Management» more  IFIPTM 2010»
13 years 3 months ago
Metric Strand Spaces for Locale Authentication Protocols
Abstract. Location-dependent services are services that adapt their behavior based on the locations of mobile devices. For many applications, it is critical that location-dependent...
F. Javier Thayer, Vipin Swarup, Joshua D. Guttman
IFIPTM
2010
204views Management» more  IFIPTM 2010»
13 years 3 months ago
xESB: An Enterprise Service Bus for Access and Usage Control Policy Enforcement
Enforcing complex policies that span organizational domains is an open challenge. Current work on SOA policy enforcement splits security in logical components that can be distribut...
Gabriela Gheorghe, Stephan Neuhaus, Bruno Crispo
IFIPTM
2010
97views Management» more  IFIPTM 2010»
13 years 3 months ago
Securing Class Initialization
Abstract. Language-based information-flow security is concerned with specifying and enforcing security policies for information flow via language constructs. Although much progre...
Keiko Nakata, Andrei Sabelfeld
IFIPTM
2010
140views Management» more  IFIPTM 2010»
13 years 3 months ago
Shinren: Non-monotonic Trust Management for Distributed Systems
Abstract. The open and dynamic nature of modern distributed systems and pervasive environments presents significant challenges to security management. One solution may be trust ma...
Changyu Dong, Naranker Dulay
EM
2010
202views Management» more  EM 2010»
13 years 3 months ago
Modular Forms on Noncongruence Subgroups and Atkin-Swinnerton-Dyer Relations
We give an example of a noncongruence subgroup Γ ⊂ SL(2, Z) whose space of weight 3 cusp forms S3(Γ) admits a basis satisfying the Atkin-Swinnerton-Dyer congruence relations wi...
Liqun Fang, J. William Hoffman, Benjamin Linowitz,...
CISIS
2010
IEEE
13 years 3 months ago
Ten Principles for Living Models - A Manifesto of Change-Driven Software Engineering
The new generation of open networked IT systems poses particular challenges to software engineering due to their evolving nature and their high quality requirements. In particular...
Ruth Breu
PC
2007
183views Management» more  PC 2007»
13 years 4 months ago
Exploring weak scalability for FEM calculations on a GPU-enhanced cluster
Dominik Göddeke, Robert Strzodka, Jamaludin M...
PC
2007
284views Management» more  PC 2007»
13 years 4 months ago
Implementation and evaluation of shared-memory communication and synchronization operations in MPICH2 using the Nemesis communic
This paper presents the implementation of MPICH2 over the Nemesis communication subsystem and the evaluation of its shared-memory performance. We describe design issues as well as...
Darius Buntinas, Guillaume Mercier, William Gropp
PC
2007
128views Management» more  PC 2007»
13 years 4 months ago
Optimizing a conjugate gradient solver with non-blocking collective operations
This paper presents a case study about the applicability and usage of non blocking collective operations. These operations provide the ability to overlap communication with computa...
Torsten Hoefler, Peter Gottschling, Andrew Lumsdai...