Sciweavers

2335 search results - page 423 / 467
» Securing Distributed Systems with Information Flow Control
Sort
View
RECSYS
2009
ACM
15 years 8 months ago
Ordering innovators and laggards for product categorization and recommendation
Different buyers exhibit different purchasing behaviors. Some rush to purchase new products while others tend to be more cautious, waiting for reviews from people they trust. In...
Sarah K. Tyler, Shenghuo Zhu, Yun Chi, Yi Zhang
ECIS
2003
15 years 3 months ago
An empirical investigation of determinants to buy application services from ASPs
The Application Service Provider (ASP) is a pivotal point in the organization of information systems, since it brings up a new paradigm: “make, buy or rent”. An ASP is a compa...
Vincenzo Morabito
128
Voted
IPPS
2007
IEEE
15 years 8 months ago
Pseudo Trust: Zero-Knowledge Based Authentication in Anonymous Peer-to-Peer Protocols
Most of the current trust models in peer-to-peer (P2P) systems are identity based, which means that in order for one peer to trust another, it needs to know the other peer’s ide...
Li Lu, Jinsong Han, Lei Hu, Jinpeng Huai, Yunhao L...
EUROPAR
2005
Springer
15 years 7 months ago
The Periodic-Linear Model of Program Behavior Capture
Abstract. Understanding and controlling program behavior is a challenging objective for the design of advanced compilers and critical system development. In this paper, we propose ...
Philippe Clauss, Bénédicte Kenmei, J...
HOTSWUP
2009
ACM
15 years 6 months ago
Online Application Upgrade Using Edition-Based Redefinition
This paper describes Edition-Based Redefinition (EBR) in the Oracle database — a novel technology and methodology to build database application patches so that installation of t...
Alan Choi