Sciweavers

325 search results - page 24 / 65
» Designing Good Deceptions in Defense of Information Systems
Sort
View
92
Voted
SIGOPSE
1990
ACM
15 years 4 months ago
A replicated Unix file system
u s e s t h e p r i m a r y c o p y r e p l i c a t i o nAbstract technique [1, 26, 27]. In this method, client calls are directed to a single primary server, which communicatesThi...
Barbara Liskov, Robert Gruber, Paul Johnson, Liuba...
124
Voted
DEXAW
2008
IEEE
126views Database» more  DEXAW 2008»
15 years 2 months ago
Incorporating Database Systems into a Secure Software Development Methodology
We have proposed in the past three separate methodologies for secure software development. We have found that they have many common and complementary aspects and we proposed a com...
Eduardo B. Fernández, Jan Jürjens, Nob...
SIGMOD
2012
ACM
246views Database» more  SIGMOD 2012»
13 years 3 months ago
Skimmer: rapid scrolling of relational query results
A relational database often yields a large set of tuples as the result of a query. Users browse this result set to find the information they require. If the result set is large, ...
Manish Singh, Arnab Nandi, H. V. Jagadish
HPDC
2003
IEEE
15 years 5 months ago
PlanetP: Using Gossiping to Build Content Addressable Peer-to-Peer Information Sharing Communities
Abstract. We present PlanetP, a peer-to-peer (P2P) content search and retrieval infrastructure targeting communities wishing to share large sets of text documents. P2P computing is...
Francisco Matias Cuenca-Acuna, Christopher Peery, ...
112
Voted
CADUI
2004
15 years 1 months ago
Dialogue-Based Design of Web Usability Questionnaires Using Ontologies
Abstract Questionnaires are nowadays widely used usability evaluation instruments, and several generic usability questionnaires are available. But these generic artifacts are not a...
Elena García Barriocanal, Miguel Áng...