Sciweavers

2200 search results - page 329 / 440
» Hop Integrity in Computer Networks
Sort
View
120
Voted
SIGUCCS
2005
ACM
15 years 9 months ago
A case study: implementing novell identity management at Drew University
Starting in 2003, Drew University began a process to replace its manual account management procedures with an automated provisioning system based upon Novell technologies. Over th...
E. Axel Larsson
CHI
2007
ACM
16 years 3 months ago
Facebook ride connect
Ride Connect is a tool integrated into the social networking site Facebook's (www.Facebook.com) event planning feature. Ride Connect helps people coordinate transportation t...
John M. Booher, Balakrishna Chennupati, Nina S. On...
PERCOM
2005
ACM
16 years 3 months ago
Exploiting Information Relationships for Access Control
Pervasive computing environments offer a multitude of information services that provide potentially complex types of information. Therefore, when running access control for sensit...
Urs Hengartner, Peter Steenkiste
ALT
2004
Springer
16 years 11 days ago
Relative Loss Bounds and Polynomial-Time Predictions for the k-lms-net Algorithm
We consider a two-layer network algorithm. The first layer consists of an uncountable number of linear units. Each linear unit is an LMS algorithm whose inputs are first “kerne...
Mark Herbster
DSN
2009
IEEE
15 years 10 months ago
Fitness-guided path exploration in dynamic symbolic execution
Dynamic symbolic execution is a structural testing technique that systematically explores feasible paths of the program under test by running the program with different test input...
Tao Xie, Nikolai Tillmann, Jonathan de Halleux, Wo...