Sciweavers

2339 search results - page 187 / 468
» A student-directed computing community
Sort
View
122
Voted
SIN
2010
ACM
14 years 11 months ago
A calculus for the qualitative risk assessment of policy override authorization
Policy override is gaining traction in the research community to improve the efficiency and usability of authorization mechanisms. These mechanisms turn the conventional privilege...
Steffen Bartsch
TMA
2010
Springer
183views Management» more  TMA 2010»
14 years 11 months ago
Kiss to Abacus: A Comparison of P2P-TV Traffic Classifiers
In the last few years the research community has proposed several techniques for network traffic classification. While the performance of these methods is promising especially for ...
Alessandro Finamore, Michela Meo, Dario Rossi, Sil...
USS
2010
14 years 11 months ago
Structuring Protocol Implementations to Protect Sensitive Data
In a bid to limit the harm caused by ubiquitous remotely exploitable software vulnerabilities, the computer systems security community has proposed primitives to allow execution o...
Petr Marchenko, Brad Karp
CCR
2010
128views more  CCR 2010»
14 years 11 months ago
The 2nd workshop on active internet measurements (AIMS-2) report
On February 8-10, 2010, CAIDA hosted the second Workshop on Active Internet Measurements (AIMS-2) as part of our series of Internet Statistics and Metrics Analysis (ISMA) workshop...
kc claffy, Emile Aben, Jordan Augé, Robert ...
94
Voted
CI
2010
81views more  CI 2010»
14 years 11 months ago
Drama Management and Player Modeling for Interactive Fiction Games
A growing research community is working towards employing drama management components in story-based games. These components gently guide the story towards a narrative arc that imp...
Manu Sharma, Santiago Ontañón, Manis...