Sciweavers

519 search results - page 31 / 104
» How to make secure email easier to use
Sort
View
IEEESCC
2009
IEEE
15 years 4 months ago
Design Pattern for Object Triple Mapping
 Up to now, developing software for the Semantic Web is much more complex than developing software for other data representation paradigms, such as relational databases. Softwa...
Matthias Quasthoff, Christoph Meinel
DAWAK
2003
Springer
15 years 2 months ago
Comprehensive Log Compression with Frequent Patterns
In this paper we present a comprehensive log compression (CLC) method that uses frequent patterns and their condensed representations to identify repetitive information from large ...
Kimmo Hätönen, Jean-François Boul...
ANOR
2010
82views more  ANOR 2010»
14 years 9 months ago
Representing risk preferences in expected utility based decision models
: The application and estimation of expected utility based decision models would benefit from having additional simple and flexible functional forms to represent risk preferences. ...
Jack Meyer
77
Voted
MOBICOM
1996
ACM
15 years 1 months ago
Security on the Move: Indirect Authentication using Kerberos
Even as mobile computing and network computing are gaining momentum, Internet security is sharing the spotlight. Security and authentication on open networks is already a difficul...
Armando Fox, Steven D. Gribble
USS
2008
14 years 12 months ago
Experiment Isolation in a Secure Cluster Testbed
A major class of network emulation testbeds is based on the Utah Emulab design: a local cluster of experimental nodes interconnected through Ethernet switches using VLANs. The VLA...
Kevin Lahey, Robert Braden, Keith Sklower