Sciweavers

3047 search results - page 203 / 610
» A Secure Distributed Search System
Sort
View
200
Voted
CORR
2012
Springer
292views Education» more  CORR 2012»
13 years 11 months ago
Optimal Threshold Control by the Robots of Web Search Engines with Obsolescence of Documents
A typical web search engine consists of three principal parts: crawling engine, indexing engine, and searching engine. The present work aims to optimize the performance of the cra...
Konstantin Avrachenkov, Alexander N. Dudin, Valent...
126
Voted
CCS
2007
ACM
15 years 10 months ago
SecureBus: towards application-transparent trusted computing with mandatory access control
The increasing number of software-based attacks has attracted substantial efforts to prevent applications from malicious interference. For example, Trusted Computing (TC) technolo...
Xinwen Zhang, Michael J. Covington, Songqing Chen,...
157
Voted
ASIAN
2009
Springer
269views Algorithms» more  ASIAN 2009»
15 years 1 months ago
Noninterference with Dynamic Security Domains and Policies
Abstract. Language-based information flow analysis is used to statically examine a program for information flows between objects of different security domains, and to verify these ...
Robert Grabowski, Lennart Beringer
137
Voted
CEC
2007
IEEE
15 years 10 months ago
Evolutionary search for cellular automata that exhibit self-organizing properties induced by external perturbations
— Cellular Automata (CAs) have been investigated extensively as abstract models of the distributed systems composed of autonomous entities characterized by local interaction. How...
Yusuke Iwase, Reiji Suzuki, Takaya Arita
135
Voted
SP
2000
IEEE
105views Security Privacy» more  SP 2000»
15 years 8 months ago
Open Source in Security: Visiting the Bizarre
Although open-source software development has virtues, there is reason to believe that the approach would not have a significant effect on the security of today’s systems. The ...
Fred B. Schneider