Sciweavers

948 search results - page 44 / 190
» Analysis of SITA policies
Sort
View
HICSS
2005
IEEE
124views Biometrics» more  HICSS 2005»
15 years 3 months ago
Information Policy, Data Mining, and National Security: False Positives and Unidentified Negatives
Since 9/11, intelligence agencies in the United States have expanded experimentation and use of data mining and analysis techniques to combat terrorism. These efforts have generat...
Terrence A. Maxwell
AIRS
2008
Springer
15 years 4 months ago
News Page Discovery Policy for Instant Crawlers
Many news pages which are of high freshness requirement are published on the internet every day. They should be downloaded immediately by instant crawlers. Otherwise, they will bec...
Yong Wang, Yiqun Liu, Min Zhang, Shaoping Ma
SIGCOMM
2009
ACM
15 years 4 months ago
Economic issues in shared infrastructures
We define some interesting incentive issues that arise in the management of virtual infrastructures. We demonstrate that participants’ decisions about the quantities of infrast...
Costas Courcoubetis, Richard R. Weber
SP
2000
IEEE
134views Security Privacy» more  SP 2000»
15 years 2 months ago
Fang: A Firewall Analysis Engine
Today, even a moderately sized corporate intranet contains multiple firewalls and routers, which are all used to enforce various aspects of the global corporate security policy. ...
Alain J. Mayer, Avishai Wool, Elisha Ziskind
POPL
2010
ACM
15 years 7 months ago
Dynamically Checking Ownership Policies in Concurrent C/C++ Programs
Concurrent programming errors arise when threads share data incorrectly. Programmers often avoid these errors by using synchronization to enforce a simple ownership policy: data i...
Jean-Phillipe Martin, Michael Hicks, Manuel Costa,...