Sciweavers

16518 search results - page 3152 / 3304
» A New Approach to Splitting-Off
Sort
View
CCS
2007
ACM
15 years 10 months ago
Alpaca: extensible authorization for distributed services
Traditional Public Key Infrastructures (PKI) have not lived up to their promise because there are too many ways to define PKIs, too many cryptographic primitives to build them wi...
Chris Lesniewski-Laas, Bryan Ford, Jacob Strauss, ...
140
Voted
CCS
2007
ACM
15 years 10 months ago
Protecting users from "themselves"
Computer usage and threat models have changed drastically since the advent of access control systems in the 1960s. Instead of multiple users sharing a single file system, each us...
William Enck, Sandra Rueda, Joshua Schiffman, Yoge...
CCS
2007
ACM
15 years 10 months ago
Defining categories to select representative attack test-cases
To ameliorate the quality of protection provided by intrusion detection systems (IDS) we strongly need more effective evaluation and testing procedures. Evaluating an IDS against ...
Mohammed S. Gadelrab, Anas Abou El Kalam, Yves Des...
CIKM
2007
Springer
15 years 10 months ago
Expertise drift and query expansion in expert search
Pseudo-relevance feedback, or query expansion, has been shown to improve retrieval performance in the adhoc retrieval task. In such a scenario, a few top-ranked documents are assu...
Craig Macdonald, Iadh Ounis
122
Voted
CIKM
2007
Springer
15 years 10 months ago
Using word similarity to eradicate junk emails
Emails are one of the most commonly used modern communication media these days; however, unsolicited emails obstruct this otherwise fast and convenient technology for information ...
Maria Soledad Pera, Yiu-Kai Ng
« Prev « First page 3152 / 3304 Last » Next »