Sciweavers

3352 search results - page 616 / 671
» Providing User Support for Interactive Applications with FUS...
Sort
View
FASE
2008
Springer
14 years 11 months ago
Automated Analysis of Permission-Based Security Using UMLsec
Abstract. To guarantee the security of computer systems, it is necessary to define security permissions to restrict the access to the systems' resources. These permissions enf...
Jan Jürjens, Jörg Schreck, Yijun Yu
CGF
2010
121views more  CGF 2010»
14 years 10 months ago
GraphDice: A System for Exploring Multivariate Social Networks
Social networks collected by historians or sociologists typically have a large number of actors and edge attributes. Applying social network analysis (SNA) algorithms to these net...
Anastasia Bezerianos, Fanny Chevalier, Pierre Drag...
CORR
2010
Springer
91views Education» more  CORR 2010»
14 years 4 months ago
TSDS: high-performance merge, subset, and filter software for time series-like data
Time Series Data Server (TSDS) is a software package for implementing a server that provides fast supersetting, sub-setting, filtering, and uniform gridding of time series-like dat...
Robert S. Weigel, Doug M. Lindholm, A. Wilson, Jer...
ICDCS
2009
IEEE
15 years 7 months ago
File Versioning for Block-Level Continuous Data Protection
Block-level continuous data protection (CDP) logs every disk block update so that disk updates within a time window are undoable. Standard file servers and DBMS servers can enjoy...
Maohua Lu, Tzi-cker Chiueh
CCS
2009
ACM
15 years 4 months ago
A practical property-based bootstrap architecture
Binary attestation, as proposed by the Trusted Computing Group (TCG), is a pragmatic approach for software integrity protection and verification. However, it has also various sho...
René Korthaus, Ahmad-Reza Sadeghi, Christia...