Sciweavers

4192 search results - page 601 / 839
» Efficient testing of groups
Sort
View
114
Voted
COLCOM
2007
IEEE
15 years 4 months ago
Transparent security for collaborative environments
Current collaborative tools are often not able to profit from existing systems for user management. It is therefore necessary for collaborative systems to administrate their users ...
Eva Hladká, Daniel Kouril, Michal Proch&aac...
92
Voted
COMPSYSTECH
2007
15 years 4 months ago
Searching the internet for learning materials through didactic indicators
: Internet offers a huge amount of didactic materials that can be used in creating new online courses. However, those materials need a deep analysis to understand their context and...
Marco Alfano, Biagio Lenzitti
ACSAC
2004
IEEE
15 years 4 months ago
Extracting Attack Manifestations to Determine Log Data Requirements for Intrusion Detection
Log data adapted for intrusion detection is a little explored research issue despite its importance for successful and efficient detection of attacks and intrusions. This paper pr...
Emilie Lundin Barse, Erland Jonsson
CCS
2006
ACM
15 years 4 months ago
Multi-signatures in the plain public-Key model and a general forking lemma
A multi-signature scheme enables a group of signers to produce a compact, joint signature on a common document, and has many potential uses. However, existing schemes impose key s...
Mihir Bellare, Gregory Neven
DAMON
2006
Springer
15 years 4 months ago
Architecture-conscious hashing
Hashing is one of the fundamental techniques used to implement query processing operators such as grouping, aggregation and join. This paper studies the interaction between modern...
Marcin Zukowski, Sándor Héman, Peter...