Sciweavers

5606 search results - page 1041 / 1122
» Advances in Information Science
Sort
View
ICSE
2005
IEEE-ACM
15 years 10 months ago
Verification and change-impact analysis of access-control policies
Sensitive data are increasingly available on-line through the Web and other distributed protocols. This heightens the need to carefully control access to data. Control means not o...
Kathi Fisler, Shriram Krishnamurthi, Leo A. Meyero...
ICS
2010
Tsinghua U.
15 years 7 months ago
Non-Malleable Codes
We introduce the notion of "non-malleable codes" which relaxes the notion of error-correction and errordetection. Informally, a code is non-malleable if the message cont...
Stefan Dziembowski, Krzysztof Pietrzak, Daniel Wic...
ICWS
2009
IEEE
15 years 7 months ago
Mobile In-store Personalized Services
: © Mobile In-Store Personalized Services Jun Li, Ismail Ari, Jhilmil Jain, Alan H. Karp, Mohamed; Dekhil HP Laboratories HPL-2009-48 mobile shopping assistant, cross-organization...
Jun Li, Ismail Ari, Jhilmil Jain, Alan H. Karp, Mo...
EUROSYS
2007
ACM
15 years 7 months ago
Concierge: a service platform for resource-constrained devices
As mobile and embedded devices become widespread, the management and configuration of the software in the devices is increasingly turning into a critical issue. OSGi is a busines...
Jan S. Rellermeyer, Gustavo Alonso
CHI
2010
ACM
15 years 4 months ago
Real time search user behavior
Real time search is an increasingly important area of information seeking on the Web. In this research, we analyze 1,005,296 user interactions with a real time search engine over ...
Bernard J. Jansen, Gerry Campbell, Matthew Gregg
« Prev « First page 1041 / 1122 Last » Next »