Sciweavers

2830 search results - page 422 / 566
» No Science without Semantics
Sort
View
119
Voted
FOCS
2005
IEEE
15 years 9 months ago
The Complexity of Online Memory Checking
We consider the problem of storing a large file on a remote and unreliable server. To verify that the file has not been corrupted, a user could store a small private (randomized...
Moni Naor, Guy N. Rothblum
134
Voted
ACMSE
2005
ACM
15 years 9 months ago
Alert confidence fusion in intrusion detection systems with extended Dempster-Shafer theory
Accurate identification of misuse is a key factor in determining appropriate ways to protect systems. Modern intrusion detection systems often use alerts from different sources su...
Dong Yu, Deborah A. Frincke
159
Voted
ITICSE
2005
ACM
15 years 9 months ago
Teaching programming and language concepts using LEGOs
concepts more concrete. The method has two main learning outcomes: • Language Specification – The goal of the assignment is to be able to build LEGO® creations on a standard g...
Cynthia S. Hood, Dennis J. Hood
171
Voted
WMASH
2004
ACM
15 years 9 months ago
LOCATOR: location estimation system For wireless LANs
With the wide spread growth of mobile computing devices and local area wireless networks, wireless network providers have started to target the users with value-added services bas...
Ankur Agiwal, Parakram Khandpur, Huzur Saran
113
Voted
CCS
2004
ACM
15 years 9 months ago
KNOW Why your access was denied: regulating feedback for usable security
We examine the problem of providing useful feedback about access control decisions to users while controlling the disclosure of the system’s security policies. Relevant feedback...
Apu Kapadia, Geetanjali Sampemane, Roy H. Campbell