Sciweavers

1929 search results - page 316 / 386
» Change Propagation Analysis Using Domain Information
Sort
View
DBSEC
2000
138views Database» more  DBSEC 2000»
15 years 5 months ago
Discovery of Multi-Level Security Policies
With the increasing complexity and dynamics of database and information systems, it becomes more and more di cult for administrative personnel to identify, specify and enforce sec...
Christina Yip Chung, Michael Gertz, Karl N. Levitt
ASPLOS
1996
ACM
15 years 8 months ago
An Integrated Compile-Time/Run-Time Software Distributed Shared Memory System
On a distributed memory machine, hand-coded message passing leads to the most efficient execution, but it is difficult to use. Parallelizing compilers can approach the performance...
Sandhya Dwarkadas, Alan L. Cox, Willy Zwaenepoel
155
Voted
COMPSEC
2008
138views more  COMPSEC 2008»
15 years 4 months ago
SMSSec: An end-to-end protocol for secure SMS
Short Message Service is usually used to transport unclassified information, but with the rise of mobile commerce it has become an integral tool for conducting business. However S...
Johnny Li-Chang Lo, Judith Bishop, Jan H. P. Eloff
ICCV
2001
IEEE
16 years 6 months ago
Modelling Faces Dynamically across Views and Over Time
A comprehensive novel multi-view dynamic face model is presented in this paper to address two challenging problems in face recognition and facial analysis: modelling faces with la...
Yongmin Li, Shaogang Gong, Heather M. Liddell
BWCCA
2010
14 years 10 months ago
Fast Deployment of Computer Forensics with USBs
As popularity of the Internet continues to grow, it changes the way of computer crime. Number of computer crime increases dramatically in recent years and investigators have been f...
Chung-Huang Yang, Pei-Hua Yen