Sciweavers

470 search results - page 62 / 94
» From evidence-based policy making to policy analytics
Sort
View
SP
2008
IEEE
129views Security Privacy» more  SP 2008»
15 years 6 months ago
Secure Web Browsing with the OP Web Browser
Abstract—Current web browsers are plagued with vulnerabilities, providing hackers with easy access to computer systems via browser-based attacks. Browser security efforts that re...
Chris Grier, Shuo Tang, Samuel T. King
ICC
2007
IEEE
228views Communications» more  ICC 2007»
15 years 6 months ago
A Non-Cooperative Power Control Game for Secondary Spectrum Sharing
—Limited spectrum resources, inefficient spectrum usage and increasing wireless communication necessitates a paradigm shift from the current fixed spectrum management policy to...
Juncheng Jia, Qian Zhang
ICDE
2007
IEEE
134views Database» more  ICDE 2007»
15 years 6 months ago
Apply Model Checking to Security Analysis in Trust Management
Trust management is a form of access control that uses delegation to achieve scalability beyond a single organization or federation. However, delegation can be difficult to contr...
Mark Reith, Jianwei Niu, William H. Winsborough
110
Voted
IISWC
2006
IEEE
15 years 6 months ago
Modeling Cache Sharing on Chip Multiprocessor Architectures
— As CMPs are emerging as the dominant architecture for a wide range of platforms (from embedded systems and game consoles, to PCs, and to servers) the need to manage on-chip res...
Pavlos Petoumenos, Georgios Keramidas, Håkan...
TCGOV
2005
Springer
15 years 6 months ago
Participatory Budget Formation Through the Web
Abstract. We describe a web-based system to support groups in elaborating participatory budgets. Rather than using physical meetings with voting mechanisms, we promote virtual meet...
Jesus Rios, David Ríos Insua, E. Fernandez,...