Sciweavers

704 search results - page 108 / 141
» Building Distributed Access Control System Using Service-Ori...
Sort
View
CCS
2011
ACM
14 years 13 days ago
Automatic error finding in access-control policies
Verifying that access-control systems maintain desired security properties is recognized as an important problem in security. Enterprise access-control systems have grown to prote...
Karthick Jayaraman, Vijay Ganesh, Mahesh V. Tripun...
ICDE
2005
IEEE
128views Database» more  ICDE 2005»
16 years 1 months ago
Exploiting Correlated Attributes in Acquisitional Query Processing
Sensor networks and other distributed information systems (such as the Web) must frequently access data that has a high per-attribute acquisition cost, in terms of energy, latency...
Amol Deshpande, Carlos Guestrin, Wei Hong, Samuel ...
93
Voted
SPAA
2003
ACM
15 years 5 months ago
Quantifying instruction criticality for shared memory multiprocessors
Recent research on processor microarchitecture suggests using instruction criticality as a metric to guide hardware control policies. Fields et al. [3, 4] have proposed a directed...
Tong Li, Alvin R. Lebeck, Daniel J. Sorin
130
Voted
SIGCOMM
2009
ACM
15 years 7 months ago
Virtual individual servers as privacy-preserving proxies for mobile devices
People increasingly generate content on their mobile devices and upload it to third-party services such as Facebook and Google Latitude for sharing and backup purposes. Although t...
Ramón Cáceres, Landon P. Cox, Harold...
MA
2000
Springer
115views Communications» more  MA 2000»
15 years 4 months ago
Quantitative Evaluation of Pairwise Interactions between Agents
Abstract. Systems comprised of multiple interacting mobile agents provide an alternate network computing paradigm that integrates remote data access, message exchange and migration...
Takahiro Kawamura, Sam Joseph, Akihiko Ohsuga, Shi...