Sciweavers

3008 search results - page 495 / 602
» Mechanisms for Importing Modules
Sort
View
CSFW
2012
IEEE
13 years 13 days ago
Gran: Model Checking Grsecurity RBAC Policies
—Role-based Access Control (RBAC) is one of the most widespread security mechanisms in use today. Given the growing complexity of policy languages and access control systems, ver...
Michele Bugliesi, Stefano Calzavara, Riccardo Foca...
PET
2012
Springer
13 years 12 days ago
Use Fewer Instances of the Letter "i": Toward Writing Style Anonymization
This paper presents Anonymouth, a novel framework for anonymizing writing style. Without accounting for style, anonymous authors risk identification. This framework is necessary t...
Andrew W. E. McDonald, Sadia Afroz, Aylin Caliskan...
SIGMETRICS
2012
ACM
247views Hardware» more  SIGMETRICS 2012»
13 years 12 days ago
A scalable architecture for maintaining packet latency measurements
Latency has become an important metric for network monitoring since the emergence of new latency-sensitive applications (e.g., algorithmic trading and high-performance computing)....
Myungjin Lee, Nick G. Duffield, Ramana Rao Kompell...
SDM
2012
SIAM
307views Data Mining» more  SDM 2012»
13 years 11 days ago
Pseudo Cold Start Link Prediction with Multiple Sources in Social Networks
Link prediction is an important task in social networks and data mining for understanding the mechanisms by which the social networks form and evolve. In most link prediction rese...
Liang Ge, Aidong Zhang
ICDE
2009
IEEE
159views Database» more  ICDE 2009»
15 years 11 months ago
Sketch-Based Summarization of Ordered XML Streams
XML streams, such as RSS feeds or complex event streams, are becoming increasingly pervasive as they provide the foundation for a wide range of emerging applications. An important...
Veronica Mayorga, Neoklis Polyzotis