Sciweavers

470 search results - page 59 / 94
» From evidence-based policy making to policy analytics
Sort
View
88
Voted
CORR
2010
Springer
169views Education» more  CORR 2010»
15 years 17 days ago
The Privacy Coach: Supporting customer privacy in the Internet of Things
The Privacy Coach is an application running on a mobile phone that supports customers in making privacy decisions when confronted with RFID tags. The approach we take to increase c...
Gerben Broenink, Jaap-Henk Hoepman, Christian van ...
116
Voted
IFIPTM
2010
140views Management» more  IFIPTM 2010»
14 years 11 months ago
Shinren: Non-monotonic Trust Management for Distributed Systems
Abstract. The open and dynamic nature of modern distributed systems and pervasive environments presents significant challenges to security management. One solution may be trust ma...
Changyu Dong, Naranker Dulay
SSDBM
2006
IEEE
163views Database» more  SSDBM 2006»
15 years 6 months ago
ACache: Using Caching to Improve the Performance of Multiple Sequence Alignments
Multiple sequence alignment represents a class of powerful bioinformatics tools with many uses in computational biology ranging from discovery of characteristic motifs and conserv...
Xun Tu, Kajal T. Claypool, Cindy X. Chen
SPRINGSIM
2007
15 years 1 months ago
Modeling and analysis of worm defense using stochastic activity networks
— Stochastic activity networks (SANs) are a widely used formalism for describing complex systems that have random behavior. Sophisticated software tools exist for the modeling an...
David M. Nicol, Steve Hanna, Frank Stratton, Willi...
SIGCOMM
2010
ACM
15 years 20 days ago
Cloudward bound: planning for beneficial migration of enterprise applications to the cloud
In this paper, we tackle challenges in migrating enterprise services into hybrid cloud-based deployments, where enterprise operations are partly hosted on-premise and partly in th...
Mohammad Y. Hajjat, Xin Sun, Yu-Wei Eric Sung, Dav...