Sciweavers

1368 search results - page 190 / 274
» Personality-Based Practical Reasoning
Sort
View
ACMDIS
2004
ACM
15 years 8 months ago
Privacy risk models for designing privacy-sensitive ubiquitous computing systems
Privacy is a difficult design issue that is becoming increasingly important as we push into ubiquitous computing environments. While there is a fair amount of theoretical work on ...
Jason I. Hong, Jennifer D. Ng, Scott Lederer, Jame...
NSPW
2004
ACM
15 years 8 months ago
The role of suspicion in model-based intrusion detection
We argue in favor of the explicit inclusion of suspicion as a concrete concept to be used in the analysis of audit data in order to guide the search for evidence of misuse. Our ap...
Timothy Hollebeek, Rand Waltzman
SIGMETRICS
2004
ACM
115views Hardware» more  SIGMETRICS 2004»
15 years 8 months ago
Emulating low-priority transport at the application layer: a background transfer service
Low priority data transfer across the wide area is useful in several contexts, for example for the dissemination of large files such as OS updates, content distribution or prefet...
Peter B. Key, Laurent Massoulié, Bing Wang
WOSP
2004
ACM
15 years 8 months ago
Performance modeling from software components
When software products are assembled from pre-defined components, performance prediction should be based on the components also. This supports rapid model-building, using previous...
Xiuping Wu, C. Murray Woodside
AIRS
2004
Springer
15 years 8 months ago
On Bit-Parallel Processing of Multi-byte Text
There exist practical bit-parallel algorithms for several types of pair-wise string processing, such as longest common subsequence computation or approximate string matching. The b...
Heikki Hyyrö, Jun Takaba, Ayumi Shinohara, Ma...