Sciweavers

6388 search results - page 1236 / 1278
» Knowledge and Information
Sort
View
SOUPS
2010
ACM
15 years 5 months ago
Do windows users follow the principle of least privilege?: investigating user account control practices
The principle of least privilege requires that users and their programs be granted the most restrictive set of privileges possible to perform required tasks in order to limit the ...
Sara Motiee, Kirstie Hawkey, Konstantin Beznosov
EDBT
2009
ACM
106views Database» more  EDBT 2009»
15 years 5 months ago
AlphaSum: size-constrained table summarization using value lattices
Consider a scientist who wants to explore multiple data sets to select the relevant ones for further analysis. Since the visualization real estate may put a stringent constraint o...
K. Selçuk Candan, Huiping Cao, Yan Qi 0002,...
APPROX
2006
Springer
89views Algorithms» more  APPROX 2006»
15 years 5 months ago
Online Algorithms to Minimize Resource Reallocations and Network Communication
Abstract. In this paper, we consider two new online optimization problems (each with several variants), present similar online algorithms for both, and show that one reduces to the...
Sashka Davis, Jeff Edmonds, Russell Impagliazzo
ATAL
2006
Springer
15 years 5 months ago
Adaptive agent negotiation via argumentation
In this paper, we study how argumentation can be used as a basis for negotiation between autonomous agents, where negotiation strategies of the different parties are represented a...
Antonis C. Kakas, Pavlos Moraitis
CHES
2006
Springer
131views Cryptology» more  CHES 2006»
15 years 5 months ago
Why One Should Also Secure RSA Public Key Elements
It is well known that a malicious adversary can try to retrieve secret information by inducing a fault during cryptographic operations. Following the work of Seifert on fault induc...
Eric Brier, Benoît Chevallier-Mames, Mathieu...
« Prev « First page 1236 / 1278 Last » Next »