Sciweavers

22114 search results - page 4383 / 4423
» Use of Models and Modelling Techniques for Service Developme...
Sort
View
DBSEC
2004
170views Database» more  DBSEC 2004»
15 years 5 months ago
RBAC/MAC Security Analysis and Design for UML
In software construction, analysis investigates the boundary of a system (scope and requirements), its usage and access, and from a security perspective, who needs access to what ...
Thuong Doan, Steven A. Demurjian, Charles E. Phill...
NSDI
2004
15 years 5 months ago
Consistent and Automatic Replica Regeneration
Reducing management costs and improving the availability of large-scale distributed systems require automatic replica regeneration, i.e., creating new replicas in response to repl...
Haifeng Yu, Amin Vahdat
SODA
2003
ACM
114views Algorithms» more  SODA 2003»
15 years 5 months ago
Lower bounds for collusion-secure fingerprinting
Collusion-secure fingerprinting codes are an important primitive used by many digital watermarking schemes [1, 10, 9]. Boneh and Shaw [3] define a model for these types of codes...
Chris Peikert, Abhi Shelat, Adam Smith
BMCBI
2010
156views more  BMCBI 2010»
15 years 4 months ago
Adaptive coarse-grained Monte Carlo simulation of reaction and diffusion dynamics in heterogeneous plasma membranes
Background: An adaptive coarse-grained (kinetic) Monte Carlo (ACGMC) simulation framework is applied to reaction and diffusion dynamics in inhomogeneous domains. The presented mod...
Stuart Collins, Michail Stamatakis, Dionisios G. V...
CCR
2008
118views more  CCR 2008»
15 years 4 months ago
A generic language for application-specific flow sampling
Flow records gathered by routers provide valuable coarse-granularity traffic information for several measurement-related network applications. However, due to high volumes of traf...
Harsha V. Madhyastha, Balachander Krishnamurthy
« Prev « First page 4383 / 4423 Last » Next »