Sciweavers

2024 search results - page 291 / 405
» A Logic Based Approach for Dynamic Access Control
Sort
View
FUN
2010
Springer
263views Algorithms» more  FUN 2010»
15 years 8 months ago
Fighting Censorship with Algorithms
In countries such as China or Iran where Internet censorship is prevalent, users usually rely on proxies or anonymizers to freely access the web. The obvious difficulty with this a...
Mohammad Mahdian
134
Voted
ICC
2009
IEEE
115views Communications» more  ICC 2009»
15 years 10 months ago
Peer-to-Peer Application Recognition Based on Signaling Activity
—Because of the enormous growth in the number of peer-to-peer (P2P) applications in recent years, P2P traffic now constitutes a substantial proportion of Internet traffic. The ...
Chen-Chi Wu, Kuan-Ta Chen, Yu-Chun Chang, Chin-Lau...
113
Voted
VISUALIZATION
1998
IEEE
15 years 7 months ago
Large scale terrain visualization using the restricted quadtree triangulation
Real-time rendering of triangulated surfaces has attracted growing interest in the last few years. However, interactive visualization of very large scale grid digital elevation mo...
Renato Pajarola
EUROSEC
2009
ACM
15 years 10 months ago
QuanTM: a quantitative trust management system
Quantitative Trust Management (QTM) provides a dynamic interpretation of authorization policies for access control decisions based on upon evolving reputations of the entities inv...
Andrew G. West, Adam J. Aviv, Jian Chang, Vinayak ...
ICADL
2004
Springer
161views Education» more  ICADL 2004»
15 years 8 months ago
An Implementation of Web Image Search Engines
This paper presents our implementation techniques for an intelligent Web image search engine. A reference architecture of the system is provided and addressed in this paper. The s...
Zhiguo Gong, Leong Hou U, Chan Wa Cheang