Sciweavers

2250 search results - page 66 / 450
» Authorizing applications in singularity
Sort
View
ACSAC
2001
IEEE
15 years 1 months ago
DAIS: A Real-Time Data Attack Isolation System for Commercial Database Applications
Traditional database security mechanisms are very limited in defending successful data attacks. Authorized but malicious transactions can make a database useless by impairing its ...
Peng Liu
CHI
2009
ACM
14 years 11 months ago
The application of forgiveness in social system design
When an offence occurs, the victim and offender can overcome the harm done through forgiveness. This paper demonstrates how forgiveness can be supported in social system design. W...
Asimina Vasalou, Jens Riegelsberger, Adam N. Joins...
RSA
2006
113views more  RSA 2006»
14 years 9 months ago
Applications of the regularity lemma for uniform hypergraphs
In this note we discuss several combinatorial problems that can be addressed by the Regularity Method for hypergraphs. Based on recent results of Nagle, Schacht and the authors, we...
Vojtech Rödl, Jozef Skokan
TIM
2010
144views Education» more  TIM 2010»
14 years 4 months ago
A Decentralized Observer for Ship Power System Applications: Implementation and Experimental Validation
In the last few years, the growing complexity of the electrical power networks, mainly due to the increased use of electronic converters together with the requirements of a higher ...
Andrea Benigni, Gabriele D'Antona, U. Ghisla, Anto...
MOBISYS
2011
ACM
14 years 20 days ago
Odessa: enabling interactive perception applications on mobile devices
Resource constrained mobile devices need to leverage computation on nearby servers to run responsive applications that recognize objects, people, or gestures from real-time video....
Moo-Ryong Ra, Anmol Sheth, Lily B. Mummert, Padman...