Sciweavers

274 search results - page 36 / 55
» Security user studies: methodologies and best practices
Sort
View
ISCAS
1999
IEEE
126views Hardware» more  ISCAS 1999»
15 years 2 months ago
Applications of clone circuits to issues in physical-design
In a companion paper of this session [1] we formally defined the notion of equivalence classes of circuits which are physical clones of an existing benchmark seed circuit created ...
Michael D. Hutton, Jonathan Rose
VLDB
2001
ACM
151views Database» more  VLDB 2001»
15 years 10 months ago
Approximate query mapping: Accounting for translation closeness
Abstract In this paper we present a mechanism for approximately translating Boolean query constraints across heterogeneous information sources. Achieving the best translation is ch...
Kevin Chen-Chuan Chang, Hector Garcia-Molina
SOUPS
2009
ACM
15 years 4 months ago
The impact of expressiveness on the effectiveness of privacy mechanisms for location-sharing
A recent trend in social networking, photo/video sharing, and location-sharing services is a demand for more expressive privacy mechanisms that provide greater control over the co...
Michael Benisch, Patrick Gage Kelley, Norman M. Sa...
IPPS
2005
IEEE
15 years 3 months ago
Self-Adaptive Scheduler Parameterization via Online Simulation
High-end parallel systems present a tremendous research challenge on how to best allocate their resources to match dynamic workload characteristics and user habits that are often ...
Barry Lawson, Evgenia Smirni
ACISP
2008
Springer
15 years 4 months ago
Advanced Permission-Role Relationship in Role-Based Access Control
Abstract. Permission-role assignment is an important issue in rolebased access control (RBAC). There are two types of problems that may arise in permission-role assignment. One is ...
Min Li, Hua Wang, Ashley W. Plank, Jianming Yong