Sciweavers

784 search results - page 37 / 157
» An underlying model for defeat mechanisms
Sort
View
WINE
2007
Springer
142views Economy» more  WINE 2007»
15 years 4 months ago
Sponsored Search with Contexts
We examine a formal model of sponsored search in which advertisers can bid not only on search terms, but on search terms under specific contexts. A context is any auxiliary infor...
Eyal Even-Dar, Michael J. Kearns, Jennifer Wortman
NDSS
2003
IEEE
15 years 3 months ago
Access Control Based on Execution History
Security is a major, frequent concern in extensible software systems such as Java Virtual Machines and the Common Language Runtime. These systems aim to enable simple, classic app...
Martín Abadi, Cédric Fournet
GAMESEC
2010
119views Game Theory» more  GAMESEC 2010»
14 years 7 months ago
Uncertainty in Interdependent Security Games
Abstract. Even the most well-motivated models of information security have application limitations due to the inherent uncertainties involving risk. This paper exemplifies a formal...
Benjamin Johnson, Jens Grossklags, Nicolas Christi...
MSWIM
2005
ACM
15 years 3 months ago
Magnetic diffusion: disseminating mission-critical data for dynamic sensor networks
Envisioning a new generation of sensor network applications in healthcare and workplace safety, we seek mechanisms that provide timely and reliable transmissions of mission-critic...
Hsing-Jung Huang, Ting-Hao Chang, Shu-Yu Hu, Polly...
IISWC
2006
IEEE
15 years 3 months ago
Modeling Cache Sharing on Chip Multiprocessor Architectures
— As CMPs are emerging as the dominant architecture for a wide range of platforms (from embedded systems and game consoles, to PCs, and to servers) the need to manage on-chip res...
Pavlos Petoumenos, Georgios Keramidas, Håkan...