Sciweavers

3544 search results - page 87 / 709
» Information Security in Open Systems
Sort
View
AH
2008
Springer
15 years 5 months ago
Do Students Trust Their Open Learner Models?
Open learner models (OLM) enable users to access their learner model to view information about their understanding. Opening the learner model to the learner may increase their perc...
Norasnita Ahmad, Susan Bull
95
Voted
ATAL
2009
Springer
15 years 3 months ago
Dynamic information source selection for intrusion detection systems
Our work presents a mechanism designed for the selection of the optimal information provider in a multi-agent, heterogeneous and unsupervised monitoring system. The selfadaptation...
Martin Rehák, Eugen Staab, Michal Pechoucek...
SP
2008
IEEE
138views Security Privacy» more  SP 2008»
14 years 11 months ago
A performance tuning methodology with compiler support
We have developed an environment, based upon robust, existing, open source software, for tuning applications written using MPI, OpenMP or both. The goal of this effort, which inte...
Oscar Hernandez, Barbara M. Chapman, Haoqiang Jin
ESORICS
2005
Springer
15 years 4 months ago
Quantifying Probabilistic Information Flow in Computational Reactive Systems
Information flow and non-interference are well-established techniques for expressing both integrity and privacy properties. Because of the enormous potential to transmit informati...
Michael Backes
ACSAC
2001
IEEE
15 years 2 months ago
Why Information Security is Hard-An Economic Perspective
According to one common view, information security comes down to technical measures. Given better access control policy models, formal proofs of cryptographic protocols, approved ...
Ross J. Anderson