Sciweavers

804 search results - page 158 / 161
» How to Break Access Control in a Controlled Manner
Sort
View
SIGMOD
1997
ACM
166views Database» more  SIGMOD 1997»
15 years 3 months ago
The InfoSleuth Project
The goal of the InfoSleuth project at MCC is to exploit and synthesize new technologies into a uni ed system that retrieves and processes information in an ever-changing network o...
Roberto J. Bayardo Jr., William Bohrer, Richard S....
113
Voted
ISCA
1996
IEEE
130views Hardware» more  ISCA 1996»
15 years 3 months ago
Informing Memory Operations: Providing Memory Performance Feedback in Modern Processors
Memory latency is an important bottleneck in system performance that cannot be adequately solved by hardware alone. Several promising software techniques have been shown to addres...
Mark Horowitz, Margaret Martonosi, Todd C. Mowry, ...
78
Voted
GECCO
2010
Springer
192views Optimization» more  GECCO 2010»
15 years 2 months ago
Resource abundance promotes the evolution of public goods cooperation
Understanding the evolution of cooperation as part of an evolutionary stable strategy (ESS) is a difficult problem that has been the focus of much work. The associated costs of co...
Brian D. Connelly, Benjamin E. Beckmann, Philip K....
87
Voted
ATAL
2008
Springer
15 years 1 months ago
Agent-based models for animal cognition: a proposal and prototype
Animal ecologists have successfully applied agent-based models to many different problems. Often, these focus on issues concerning collective behaviors, environmental interactions...
Elske van der Vaart, Rineke Verbrugge
CCS
2008
ACM
15 years 1 months ago
Location privacy of distance bounding protocols
Distance bounding protocols have been proposed for many security critical applications as a means of getting an upper bound on the physical distance to a communication partner. As...
Kasper Bonne Rasmussen, Srdjan Capkun