Sciweavers

1734 search results - page 207 / 347
» What works
Sort
View
IFIP
2005
Springer
15 years 6 months ago
Type-Based Distributed Access Control vs. Untyped Attackers
This paper considers the effect of untyped attackers inside a distributed system where security is enforced by the type system. In previous work we introduced the Key-Based Decentr...
Tom Chothia, Dominic Duggan
ISW
2005
Springer
15 years 6 months ago
Evaluating Access Control Policies Through Model Checking
We present a model-checking algorithm which can be used to evaluate access control policies, and a tool which implements it. The evaluation includes not only assessing whether the ...
Nan Zhang 0003, Mark Ryan, Dimitar P. Guelev
93
Voted
NIME
2005
Springer
136views Music» more  NIME 2005»
15 years 6 months ago
Learning Advanced Skills on New Instruments (or practising scales and arpeggios on your NIME)
When learning a classical instrument, people often either take lessons in which an existing body of “technique” is delivered, evolved over generations of performers, or in som...
Sageev Oore
95
Voted
WAC
2005
Springer
121views Communications» more  WAC 2005»
15 years 6 months ago
Semantic Interoperability for an Autonomic Knowledge Delivery Service
: The development and deployment of interconnected networks is being increasingly limited by their complexity and the concomitant cost of managing the operational network. Autonomi...
David Lewis, Declan O'Sullivan, Ruaidhri Power, Jo...
WEBI
2005
Springer
15 years 6 months ago
A Novel Way of Computing Similarities between Nodes of a Graph, with Application to Collaborative Recommendation
This work presents a new perspective on characterizing the similarity between elements of a database or, more generally, nodes of a weighted, undirected, graph. It is based on a M...
François Fouss, Alain Pirotte, Marco Saeren...