Sciweavers

14704 search results - page 2647 / 2941
» computing 2007
Sort
View
WINE
2007
Springer
120views Economy» more  WINE 2007»
15 years 10 months ago
Public Advertisement Broker Markets
Motivated by the growth of various networked systems as potential market places, we study market models wherein, owing to the size of the markets, transactions take place between l...
Atish Das Sarma, Deeparnab Chakrabarty, Sreenivas ...
133
Voted
WISA
2007
Springer
15 years 10 months ago
A Compositional Multiple Policies Operating System Security Model
Multilevel security policies aim at only confidentiality assurance, with less consideration on integrity assurance and weakness in expressing channel control policies. Besides, the...
Lei Xia, Wei Huang, Hao Huang
120
Voted
NSPW
2003
ACM
15 years 9 months ago
Owner-controlled information
Large-scale data breaches exposing sensitive personal information are becoming commonplace. For numerous reasons, conventional personal (identification) information leaks from da...
Carrie Gates, Jacob Slonim
WAIFI
2010
Springer
192views Mathematics» more  WAIFI 2010»
15 years 9 months ago
Type-II Optimal Polynomial Bases
In the 1990s and early 2000s several papers investigated the relative merits of polynomial-basis and normal-basis computations for F2n . Even for particularly squaring-friendly app...
Daniel J. Bernstein, Tanja Lange
KR
2010
Springer
15 years 9 months ago
The Temporal Logic of Token Causes
While type causality helps us to understand general relationships such as the etiology of a disease (smoking causing lung cancer), token causality aims to explain causal connectio...
Samantha Kleinberg, Bud Mishra
« Prev « First page 2647 / 2941 Last » Next »