Sciweavers

2826 search results - page 437 / 566
» A resource-based analysis of IT sourcing
Sort
View
97
Voted
ICISS
2007
Springer
15 years 7 months ago
Towards Automated Privilege Separation
Applications are subject to threat from a number of attack vectors, and limiting their attack surface is vital. By using privilege separation to constrain application access to pro...
Dhananjay Bapat, Kevin R. B. Butler, Patrick Drew ...
146
Voted
IESS
2007
Springer
92views Hardware» more  IESS 2007»
15 years 7 months ago
An Interactive Model Re-Coder for Efficient SoC Specification
To overcome the complexity in System-on-Chip (SoC) design, researchers have developed sophisticated design flows that significantly reduce the development time through automation...
Pramod Chandraiah, Rainer Dömer
ISI
2007
Springer
15 years 7 months ago
On-Demand Information Portals for Disaster Situations
Abstract—This paper describes our work on developing technology for rapidly assembling information portals that provide integrated access to and analysis of information from mult...
Yiming Ma, Dmitri V. Kalashnikov, Ramaswamy Hariha...
NETCOOP
2007
Springer
15 years 7 months ago
Transit Prices Negotiation: Combined Repeated Game and Distributed Algorithmic Approach
— We present both a game theoretic and a distributed algorithmic approach for the transit price negotiation problem in the interdomain routing framework. We analyze the behavior ...
Dominique Barth, Johanne Cohen, Loubna Echabbi, Ch...
SGAI
2007
Springer
15 years 7 months ago
Frequent Set Meta Mining: Towards Multi-Agent Data Mining
In this paper we describe the concept of Meta ARM in the context of its objectives and challenges and go on to describe and analyse a number of potential solutions. Meta ARM is de...
Kamal Ali Albashiri, Frans Coenen, Robert Sanderso...