Sciweavers

1875 search results - page 266 / 375
» Modeling the Security of Steganographic Systems
Sort
View
89
Voted
WSC
2007
15 years 2 months ago
Simulation of passenger check-in at a medium-sized US airport
Delays in the check-in system at an airport vary with times of the day, day of the week, and types of check-in modes chosen by the passengers. Extensive data collection of the che...
Simone Appelt, Rajan Batta, Li Lin, Colin G. Drury
ECSCW
2001
15 years 1 months ago
Team automata for spatial access control
Abstract. Team automata provide a framework for capturing notions like coordination, colon, and cooperation in distributed systems. They consist of an abstract specification of com...
Maurice H. ter Beek, Clarence A. Ellis, Jetty Klei...
79
Voted
OSDI
2008
ACM
16 years 22 days ago
SALSA: Analyzing Logs as StAte Machines
SALSA examines system logs to derive state-machine views of the sytem's execution, along with control-flow, data-flow models and related statistics. Exploiting SALSA's d...
Jiaqi Tan, Xinghao Pan, Soila Kavulya, Rajeev Gand...
84
Voted
IEEEARES
2006
IEEE
15 years 6 months ago
No Risk is Unsafe: Simulated Results on Dependability of Complementary Currencies
Efforts have been put for electronization of complementary currencies (alternative forms of monetary media) in the hope that it would reduce their operational cost. However, this ...
Kenji Saito, Eiichi Morino, Jun Murai
112
Voted
CCS
2010
ACM
15 years 3 months ago
Towards publishing recommendation data with predictive anonymization
Recommender systems are used to predict user preferences for products or services. In order to seek better prediction techniques, data owners of recommender systems such as Netfli...
Chih-Cheng Chang, Brian Thompson, Hui (Wendy) Wang...