Sciweavers

7544 search results - page 1324 / 1509
» Network Forensics Analysis
Sort
View
STOC
2009
ACM
133views Algorithms» more  STOC 2009»
16 years 5 months ago
Near-perfect load balancing by randomized rounding
We consider and analyze a new algorithm for balancing indivisible loads on a distributed network with n processors. The aim is minimizing the discrepancy between the maximum and m...
Tobias Friedrich, Thomas Sauerwald
CCS
2009
ACM
16 years 5 months ago
D-algebra for composing access control policy decisions
This paper proposes a D-algebra to compose decisions from multiple access control policies. Compared to other algebrabased approaches aimed at policy composition, D-algebra is the...
Qun Ni, Elisa Bertino, Jorge Lobo
PKC
2009
Springer
129views Cryptology» more  PKC 2009»
16 years 5 months ago
Modeling Key Compromise Impersonation Attacks on Group Key Exchange Protocols
A key exchange protocol allows a set of parties to agree upon a secret session key over a public network. Two-party key exchange (2PKE) protocols have been rigorously analyzed unde...
Colin Boyd, Juan Manuel González Nieto, M. ...
CHI
2008
ACM
16 years 5 months ago
Pick me!: link selection in expertise search results
Expertise locator systems have been designed to help find experts within organizations. While there are many examples of these systems in the literature, there has not been any sy...
N. Sadat Shami, Kate Ehrlich, David R. Millen
CHI
2008
ACM
16 years 5 months ago
LiveRAC: interactive visual exploration of system management time-series data
We present LiveRAC, a visualization system that supports the analysis of large collections of system management timeseries data consisting of hundreds of parameters across thousan...
Peter McLachlan, Tamara Munzner, Eleftherios Kouts...
« Prev « First page 1324 / 1509 Last » Next »