Sciweavers

29143 search results - page 5681 / 5829
» A Sortation System Model
Sort
View
CAISE
2010
Springer
14 years 10 months ago
Dynamic Authorisation Policies for Event-Based Task Delegation
Task delegation presents one of the business process security leitmotifs. It defines a mechanism that bridges the gap between both workflow and access control systems. There are tw...
Khaled Gaaloul, Ehtesham Zahoor, François C...
90
Voted
PODC
2010
ACM
14 years 10 months ago
The k-bakery: local-spin k-exclusion using non-atomic reads and writes
Mutual exclusion is used to coordinate access to shared resources by concurrent processes. k-Exclusion is a variant of mutual exclusion in which up to k processes can simultaneous...
Robert Danek
SIGCOMM
2010
ACM
14 years 10 months ago
Passive IP traceback: capturing the origin of anonymous traffic through network telescopes
IP traceback can be used to find the origin of anonymous traffic; however, Internet-scale IP traceback systems have not been deployed due to a need for cooperation between Interne...
Guang Yao, Jun Bi, Zijian Zhou
CMS
2010
207views Communications» more  CMS 2010»
14 years 10 months ago
Statistical Detection of Malicious PE-Executables for Fast Offline Analysis
While conventional malware detection approaches increasingly fail, modern heuristic strategies often perform dynamically, which is not possible in many applications due to related ...
Ronny Merkel, Tobias Hoppe, Christian Krätzer...
ICASSP
2010
IEEE
14 years 10 months ago
Speaker identification with distant microphone speech
The field of speaker identification has recently seen significant advancement, but improvements have tended to be benchmarked on near-field speech, ignoring the more realistic set...
Qin Jin, Runxin Li, Qian Yang, Kornel Laskowski, T...
« Prev « First page 5681 / 5829 Last » Next »