Sciweavers

1732 search results - page 278 / 347
» Knowledge-based organization evaluation
Sort
View
148
Voted
PVLDB
2010
111views more  PVLDB 2010»
14 years 10 months ago
PolicyReplay: Misconfiguration-Response Queries for Data Breach Reporting
Recent legislation has increased the requirements of organizations to report data breaches, or unauthorized access to data. While access control policies are used to restrict acce...
Daniel Fabbri, Kristen LeFevre, Qiang Zhu
166
Voted
TSC
2010
182views more  TSC 2010»
14 years 10 months ago
A Query Rewriting Approach for Web Service Composition
Data-Providing (DP) services allow query-like access to organizations' data via web services. The invocation of a DP service results in the execution of a query over data sour...
Mahmoud Barhamgi, Djamal Benslimane, Brahim Medjah...
NPAR
2010
ACM
15 years 8 months ago
Sisley the abstract painter
We present an interactive abstract painting system named Sisley. Sisley works upon the psychological principle [Berlyne 1971] that abstract arts are often characterized by their gr...
Mingtian Zhao, Song Chun Zhu
162
Voted
ACNS
2011
Springer
244views Cryptology» more  ACNS 2011»
14 years 7 months ago
Quantitatively Analyzing Stealthy Communication Channels
Abstract. Attackers in particular botnet controllers use stealthy messaging systems to set up large-scale command and control. Understanding the capacity of such communication chan...
Patrick Butler, Kui Xu, Danfeng (Daphne) Yao
136
Voted
EUROSYS
2011
ACM
14 years 7 months ago
Increasing performance in byzantine fault-tolerant systems with on-demand replica consistency
Traditional agreement-based Byzantine fault-tolerant (BFT) systems process all requests on all replicas to ensure consistency. In addition to the overhead for BFT protocol and sta...
Tobias Distler, Rüdiger Kapitza