Sciweavers

4264 search results - page 830 / 853
» Provenance-aware secure networks
Sort
View
GRID
2006
Springer
14 years 9 months ago
Cacheable Decentralized Groups for Grid Resource Access Control
Abstract-- Sharing data among collaborators in widely distributed systems remains a challenge due to limitations with existing methods for defining groups across administrative dom...
Jeffrey Hemmes, Douglas Thain
81
Voted
IJSN
2008
147views more  IJSN 2008»
14 years 9 months ago
Formal modelling and analysis of XML firewall for service-oriented systems
: Firewalls have been designed as a major component to protect a network or a server from being attacked. However, due to their emphasis on packet filtering rather than verifying u...
Haiping Xu, Mihir M. Ayachit, Abhinay Reddyreddy
IJVR
2008
118views more  IJVR 2008»
14 years 9 months ago
Use of Technology Enhanced Education to Improve Teaching and Learning Process
The modern world continues to change as Information Technology (IT) related applications proceed to evolve at a rapid pace. The need for IT continues to grow as we begin to meaning...
Daniela Marghitu, Elizabeth Zylla-Jones, Santosh B...
104
Voted
JMLR
2008
148views more  JMLR 2008»
14 years 9 months ago
Linear-Time Computation of Similarity Measures for Sequential Data
Efficient and expressive comparison of sequences is an essential procedure for learning with sequential data. In this article we propose a generic framework for computation of sim...
Konrad Rieck, Pavel Laskov
JSW
2008
127views more  JSW 2008»
14 years 9 months ago
A Trust Based System for Enhanced Spam Filtering
The effectiveness of current anti-spam systems is limited by the ability of spammers to adapt to filtering techniques and the lack of incentive for mail servers to filter outgoing ...
Jimmy McGibney, Dmitri Botvich