Sciweavers

3458 search results - page 236 / 692
» Abstracting Control
Sort
View
CHI
2005
ACM
16 years 4 months ago
A study of preferences for sharing and privacy
We describe studies of preferences about information sharing aimed at identifying fundamental concerns with and at understanding how people might abstract the details of sharing i...
Judith S. Olson, Jonathan Grudin, Eric Horvitz
146
Voted
ASIAN
2006
Springer
153views Algorithms» more  ASIAN 2006»
15 years 7 months ago
Automata-Based Confidentiality Monitoring
Abstract Non-interference is typically used as a baseline security policy to formalize confidentiality of secret information manipulated by a program. In contrast to static checkin...
Gurvan Le Guernic, Anindya Banerjee, Thomas P. Jen...
141
Voted
ICCS
2007
Springer
15 years 7 months ago
Heterogeneous Workflows in Scientific Workflow Systems
Workflow systems are used to model a range of scientific and business applications, each requiring a different set of capabilities. We analyze how these heterogeneous approaches ca...
Vasa Curcin, Moustafa Ghanem, Patrick Wendel, Yike...
124
Voted
ICC
2007
IEEE
179views Communications» more  ICC 2007»
15 years 10 months ago
Dynamic Bandwidth Allocation for Bandwidth Asymmetry Wireless Networks
Abstract— This paper addresses when and how to adjust bandwidth allocations between uplink and downlink in a multi-service wireless network with bandwidth asymmetry under dynamic...
Gang Feng, Xun Yang
136
Voted
EDBTW
2004
Springer
15 years 9 months ago
XML-Based Revocation and Delegation in a Distributed Environment
Abstract. The rapid increase on the circulation of data over the web has highlighted the need for distributed storage of Internet-accessible information due to the rapid increase o...
Konstantina Stoupa, Athena Vakali, Fang Li, Ioanni...