Sciweavers

1927 search results - page 364 / 386
» An Access Control Model for Location based Services
Sort
View
GFKL
2006
Springer
133views Data Mining» more  GFKL 2006»
13 years 11 months ago
Adaptive Conjoint Analysis for Pricing Music Downloads
Finding the right pricing for music downloads is of ample importance to the recording industry and music download service providers. For the recently introduced music downloads, re...
Christoph Breidert, Michael Hahsler
BTW
2005
Springer
142views Database» more  BTW 2005»
14 years 1 months ago
Self-Extending Peer Data Management
Abstract: Peer data management systems (PDMS) are the natural extension of integrated information systems. Conventionally, a single integrating system manages an integrated schema,...
Ralf Heese, Sven Herschel, Felix Naumann, Armin Ro...
SP
1998
IEEE
173views Security Privacy» more  SP 1998»
13 years 11 months ago
An Automated Approach for Identifying Potential Vulnerabilities in Software
This paper presents results from analyzing the vulnerability of security-critical software applications to malicious threats and anomalous events using an automated fault injectio...
Anup K. Ghosh, Tom O'Connor, Gary McGraw
BMCBI
2006
155views more  BMCBI 2006»
13 years 7 months ago
CAVER: a new tool to explore routes from protein clefts, pockets and cavities
Background: The main aim of this study was to develop and implement an algorithm for the rapid, accurate and automated identification of paths leading from buried protein clefts, ...
Martin Petrek, Michal Otyepka, Pavel Banás,...
NSPW
2004
ACM
14 years 1 months ago
Support for multi-level security policies in DRM architectures
Digital rights management systems allow copyrighted content to be commercialized in digital format without the risk of revenue loss due to piracy. Making such systems secure is no...
Bogdan C. Popescu, Bruno Crispo, Andrew S. Tanenba...