Sciweavers

784 search results - page 90 / 157
» Personalizing access to learning networks
Sort
View
KDD
2010
ACM
272views Data Mining» more  KDD 2010»
15 years 3 months ago
Beyond heuristics: learning to classify vulnerabilities and predict exploits
The security demands on modern system administration are enormous and getting worse. Chief among these demands, administrators must monitor the continual ongoing disclosure of sof...
Mehran Bozorgi, Lawrence K. Saul, Stefan Savage, G...
WWW
2003
ACM
15 years 5 months ago
Media Companion: Delivering Content-oriented Web Services to Internet Media
In the past few years we have seen a huge industrial investment on the development of content delivery networks (CDNs) which provide a large number of caches and storage devices a...
Wei-Ying Ma, Xing Xie, Chun Yuan, Yu Chen, Zheng Z...
ICALT
2006
IEEE
15 years 6 months ago
Mobile Technology and Content Delivery in Education
The purpose of this workshop is to identify various issues that are pertinent to the development and delivery of content in the context of mobile devices. The workshop will focus ...
Rory McGreal, Kinshuk
SOSP
2003
ACM
15 years 8 months ago
Decentralized user authentication in a global file system
The challenge for user authentication in a global file system is allowing people to grant access to specific users and groups in remote administrative domains, without assuming ...
Michael Kaminsky, George Savvides, David Mazi&egra...
110
Voted
SACMAT
2006
ACM
15 years 5 months ago
Traust: a trust negotiation-based authorization service for open systems
In recent years, trust negotiation (TN) has been proposed as a novel access control solution for use in open system environments in which resources are shared across organizationa...
Adam J. Lee, Marianne Winslett, Jim Basney, Von We...