Sciweavers

3544 search results - page 405 / 709
» Information Security in Open Systems
Sort
View
ETRICS
2006
15 years 3 months ago
Revocable Anonymity
Anonymity services in the EU may be forced by the new EU data retention directive to collect connection data and deanonymise some of their users in case of serious crimes. For this...
Stefan Köpsell, Rolf Wendolsky, Hannes Federr...
SACMAT
2010
ACM
15 years 2 days ago
On the definition of role mining
There have been many approaches proposed for role mining. However, the problems solved often differ due to a lack of consensus on the formal definition of the role mining problem....
Mario Frank, Joachim M. Buhmann, David A. Basin
ISI
2007
Springer
14 years 11 months ago
Outil autonome de surveillance de grilles
ABSTRACT. Grids have become very complex. It makes the deployment and maintenance of systems a difficult task requiring lots of efforts from administrators. We believe that peer-t...
Laurent Baduel, Satoshi Matsuoka
ICEIS
2009
IEEE
15 years 6 months ago
AgEx: A Financial Market Simulation Tool for Software Agents
Many researchers in the software agent field use the financial domain as a test bed to develop adaptation, cooperation and learning skills of software agents. However, there are no...
Paulo André Lima de Castro, Jaime Sim&atild...
VISSYM
2007
15 years 2 months ago
Grouse: Feature-Based, Steerable Graph Hierarchy Exploration
Grouse is a feature-based approach to steerable exploration of a graph and an associated hierarchy. Steerability allows exploration to begin immediately, rather than requiring a c...
Daniel Archambault, Tamara Munzner, David Auber