Sciweavers

97 search results - page 5 / 20
» Adaptive Data Integrity through Dynamically Redundant Data S...
Sort
View
CSFW
2011
IEEE
12 years 10 months ago
Modular Protections against Non-control Data Attacks
—This paper introduces YARRA, a conservative extension to C to protect applications from non-control data attacks. YARRA programmers specify their data integrity requirements by ...
Cole Schlesinger, Karthik Pattabiraman, Nikhil Swa...
SIGIR
2012
ACM
12 years 24 days ago
Optimizing positional index structures for versioned document collections
Versioned document collections are collections that contain multiple versions of each document. Important examples are Web archives, Wikipedia and other wikis, or source code and ...
Jinru He, Torsten Suel
GECCO
2007
Springer
162views Optimization» more  GECCO 2007»
14 years 4 months ago
Using pair approximations to predict takeover dynamics in spatially structured populations
The topological properties of a network directly impact the flow of information through a system. For example, in natural populations, the network of inter-individual contacts aff...
Joshua L. Payne, Margaret J. Eppstein
BMCBI
2006
184views more  BMCBI 2006»
13 years 10 months ago
PubFocus: semantic MEDLINE/PubMed citations analytics through integration of controlled biomedical dictionaries and ranking algo
Background: Understanding research activity within any given biomedical field is important. Search outputs generated by MEDLINE/PubMed are not well classified and require lengthy ...
Maksim V. Plikus, Zina Zhang, Cheng-Ming Chuong
CCS
2007
ACM
14 years 4 months ago
Managing RBAC states with transitive relations
In this paper, we study the maintenance of role-based access control (RBAC) models in database environments using transitive closure relations. In particular, the algorithms that ...
Chaoyi Pang, David P. Hansen, Anthony J. Maeder