Sciweavers

COMPSAC
2000
IEEE
13 years 9 months ago
Chinese Wall Security Model and Conflict Analysis
Brewer and Nash, and immediately updated by this author, introduced Chinese Wall security policy models for commercial security. Applying Pawlak's idea of conflict analysis, ...
Tsau Young Lin
COMPSAC
2000
IEEE
13 years 9 months ago
GAPS: A Genetic Programming System
Genetic programming tackles the issue of how to automatically create a working computer program for a given problem from some initial problem statement. The goal is accomplished i...
Michael D. Kramer, Du Zhang
COMPSAC
2000
IEEE
13 years 9 months ago
Practical Key Distribution Schemes for Channel Protection
– This paper presents three key distribution schemes for channel protection. With the proposed schemes, encryption keys of the ordered programs can be distributed to the authoriz...
Yu-Lun Huang, Shiuh-Pyng Winston Shieh, Jian-Chyua...
COMPSAC
2000
IEEE
13 years 9 months ago
Effort-Index-Based Software Reliability Growth Models and Performance Assessment
In this paper, we first show that the logistic testing-effort function is practically acceptable/helpful for modeling software reliability growth and providing a reasonable descri...
Chin-Yu Huang, Sy-Yen Kuo, Michael R. Lyu
COMPSAC
2000
IEEE
13 years 9 months ago
LRU-SP: A Size-Adjusted and Popularity-Aware LRU Replacement Algorithm for Web Caching
This paper presents LRU-SP, a size-adjusted and popularity-aware extension to Least Recently Used (LRU) for caching web objects. The standard LRU, focusing on recently used and eq...
Kai Cheng, Yahiko Kambayashi