Sciweavers

1671 search results - page 254 / 335
» Dynamic Data Warehouse Design
Sort
View
B
2007
Springer
15 years 3 months ago
Security Policy Enforcement Through Refinement Process
Abstract. In the area of networks, a common method to enforce a security policy expressed in a high-level language is based on an ad-hoc and manual rewriting process [24]. We argue...
Nicolas Stouls, Marie-Laure Potet
PERCOM
2010
ACM
15 years 3 months ago
Sell your experiences: a market mechanism based incentive for participatory sensing
—This paper studies economic models of user participation incentive in participatory sensing applications. User participation is the most important element in participatory sensi...
Juong-Sik Lee, Baik Hoh
USS
2008
15 years 2 months ago
Modeling the Trust Boundaries Created by Securable Objects
One of the most critical steps of any security review involves identifying the trust boundaries that an application is exposed to. While methodologies such as threat modeling can ...
Matt Miller
HT
2010
ACM
15 years 1 months ago
Assessing users' interactions for clustering web documents: a pragmatic approach
In this paper we are interested in describing Web pages by how users interact within their contents. Thus, an alternate but complementary way of labelling and classifying Web docu...
Luis A. Leiva, Enrique Vidal
GRAPHICSINTERFACE
2007
15 years 1 months ago
A mixing board interface for graphics and visualization applications
We use a haptically enhanced mixing board with a video projector as an interface to various data visualization tasks. We report results of an expert review with four participants,...
Matthew Crider, Steven Bergner, Thomas N. Smyth, T...