Sciweavers

366 search results - page 20 / 74
» Access Policy Design Supported by FCA Methods
Sort
View
PUC
2008
113views more  PUC 2008»
13 years 8 months ago
Design and evaluation of systems to support interaction capture and retrieval
Although many recent systems have been built to support Information Capture and Retrieval (ICR), these have not generally been successful. This paper presents studies that evaluate...
Steve Whittaker, Simon Tucker, Kumutha Swampillai,...
EUROSEC
2009
ACM
14 years 3 months ago
QuanTM: a quantitative trust management system
Quantitative Trust Management (QTM) provides a dynamic interpretation of authorization policies for access control decisions based on upon evolving reputations of the entities inv...
Andrew G. West, Adam J. Aviv, Jian Chang, Vinayak ...
EUROSYS
2006
ACM
14 years 5 months ago
Database replication policies for dynamic content applications
The database tier of dynamic content servers at large Internet sites is typically hosted on centralized and expensive hardware. Recently, research prototypes have proposed using d...
Gokul Soundararajan, Cristiana Amza, Ashvin Goel
CONCURRENCY
2007
83views more  CONCURRENCY 2007»
13 years 8 months ago
Enabling community access to TeraGrid visualization resources
Visualization is an important part of the data analysis process. Many researchers, however, do not have access to the resources required to do visualization effectively for large ...
Justin Binns, Jonathan DiCarlo, Joseph A. Insley, ...
ICC
2007
IEEE
288views Communications» more  ICC 2007»
14 years 3 months ago
Joint Channel State Based Random Access and Adaptive Modulation in Wireless LAN with Multi-Packet Reception
—Conventional 802.11 medium access control (MAC) characteristics. In particular, all of these designs adopted a protocols have been designed separately from the characteristics s...
Wei Lan Huang, Khaled Ben Letaief, Ying Jun Zhang