Sciweavers

416 search results - page 67 / 84
» Enough of Processes - Lets do Practices
Sort
View
ATAL
2006
Springer
15 years 1 months ago
Tractable negotiation in tree-structured domains
Multiagent resource allocation is a timely and exciting area of research at the interface of Computer Science and Economics. One of the main challenges in this area is the high co...
Yann Chevaleyre, Ulle Endriss, Nicolas Maudet
USS
2008
14 years 12 months ago
You Go to Elections with the Voting System You Have: Stop-Gap Mitigations for Deployed Voting Systems
In light of the systemic vulnerabilities uncovered by recent reviews of deployed e-voting systems, the surest way to secure the voting process would be to scrap the existing syste...
J. Alex Halderman, Eric Rescorla, Hovav Shacham, D...
DBSEC
2010
126views Database» more  DBSEC 2010»
14 years 11 months ago
Mining Likely Properties of Access Control Policies via Association Rule Mining
Abstract. Access control mechanisms are used to control which principals (such as users or processes) have access to which resources based on access control policies. To ensure the...
JeeHyun Hwang, Tao Xie, Vincent C. Hu, Mine Altuna...
DGO
2007
125views Education» more  DGO 2007»
14 years 11 months ago
Members of congress websites: diffusion at the tip of the iceberg
How do Members of Congress manage the opportunities that the Internet offers? Here we present the initial results from interviews with 100 Congressional offices about their decisi...
David Lazer, Ines Mergel, Curt Ziniel, Kevin Ester...
MEDINFO
2007
129views Healthcare» more  MEDINFO 2007»
14 years 11 months ago
Confidentiality Preserving Audits of Electronic Medical Record Access
Failure to supply a care provider with timely access to a patient's medical record can lead to patient harm or death. As such, healthcare organizations often endow care provi...
Bradley Malin, Edoardo Airoldi