Sciweavers

5675 search results - page 1094 / 1135
» Exploiting Chaos for Computation
Sort
View
ACSAC
2007
IEEE
15 years 4 months ago
Distributed Secure Systems: Then and Now
The early 1980s saw the development of some rather sophisticated distributed systems. These were not merely networked file systems: rather, using remote procedure calls, hierarchi...
Brian Randell, John M. Rushby
99
Voted
ECRIME
2007
15 years 4 months ago
Evaluating a trial deployment of password re-use for phishing prevention
We propose a scheme that exploits scale to prevent phishing. We show that while stopping phishers from obtaining passwords is very hard, detecting the fact that a password has bee...
Dinei A. F. Florêncio, Cormac Herley
117
Voted
ELPUB
2007
ACM
15 years 4 months ago
Technical Infrastructure and Policy Framework for Maximising the Benefits from Research Output
Electronic publishing is one part of a much larger process. There is a research lifecycle from creation of a programme for funded research through research proposals, projects, ou...
Keith G. Jeffery
DASFAA
2010
IEEE
190views Database» more  DASFAA 2010»
15 years 4 months ago
k-Selection Query over Uncertain Data
This paper studies a new query on uncertain data, called k-selection query. Given an uncertain dataset of N objects, where each object is associated with a preference score and a p...
Xingjie Liu, Mao Ye, Jianliang Xu, Yuan Tian, Wang...
ICLP
2010
Springer
15 years 4 months ago
Bisimilarity in Concurrent Constraint Programming
Abstract. In this doctoral work we aim at developing a new approach to labelled semantics and equivalences for the Concurrent Constraint Programming (CCP) which will enable a broad...
Andres A. Aristizabal P.
« Prev « First page 1094 / 1135 Last » Next »