Sciweavers

1058 search results - page 108 / 212
» Fault-Tolerant Resource Reasoning
Sort
View
ICDE
2007
IEEE
149views Database» more  ICDE 2007»
15 years 4 months ago
Private Relationships in Social Networks
Current social networks implement very simple protection mechanisms, according to which a user can state whether his/her personal data, relationships, and resources should be eith...
Barbara Carminati, Elena Ferrari, Andrea Perego
90
Voted
WSC
2008
15 years 3 months ago
Optimization of Multi-Project Environment (OPMPE)
Construction business is project oriented and that is why every construction organization is dependent on projects. Typically they undertake multiple projects with limited multipl...
Lokman Hossain, Janaka Ruwanpura
ASWC
2006
Springer
15 years 2 months ago
A Semantic Search Conceptual Model and Application in Security Access Control
Abstract. We propose a conceptual model for semantic search and implement it in security access control. The model provides security access control to extend the search capabilitie...
Kunmei Wen, Zhengding Lu, Ruixuan Li, Xiaolin Sun,...
ATAL
2010
Springer
15 years 1 months ago
A graph-theoretic approach to protect static and moving targets from adversaries
The static asset protection problem (SAP) in a road network is that of allocating resources to protect vertices, given any possible behavior by an adversary determined to attack t...
John P. Dickerson, Gerardo I. Simari, V. S. Subrah...
97
Voted
CORR
2010
Springer
91views Education» more  CORR 2010»
15 years 26 days ago
Verifiable Network-Performance Measurements
In the current Internet, there is no clean way for affected parties to react to poor forwarding performance: to detect and assess Service Level Agreement (SLA) violations by a con...
Katerina J. Argyraki, Petros Maniatis, Ankit Singl...